Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-2024 (GCVE-0-2019-2024)
Vulnerability from cvelistv5
Published
2019-06-19 20:06
Modified
2024-08-04 18:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Elevation of privilege
Summary
In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:52.537Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2019-03-01" }, { "name": "USN-4094-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4118-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4118-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Android", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Android kernel" } ] } ], "descriptions": [ { "lang": "en", "value": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel" } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-02T23:06:15", "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://source.android.com/security/bulletin/2019-03-01" }, { "name": "USN-4094-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4118-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4118-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2019-2024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Android", "version": { "version_data": [ { "version_value": "Android kernel" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2019-03-01", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2019-03-01" }, { "name": "USN-4094-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4118-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "assignerShortName": "google_android", "cveId": "CVE-2019-2024", "datePublished": "2019-06-19T20:06:41", "dateReserved": "2018-12-10T00:00:00", "dateUpdated": "2024-08-04T18:35:52.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-2024\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2019-06-19T21:15:10.697\",\"lastModified\":\"2024-11-21T04:40:05.270\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel\"},{\"lang\":\"es\",\"value\":\"En em28xx_unregister_dvb of em28xx-dvb.c, existe un posible uso de memoria previamente liberada. Esto conllevar\u00eda a una escalada local de privilegios sin necesidad de privilegios adicionales de ejecuci\u00f3n. No es necesaria la interacci\u00f3n del usuario para su funci\u00f3n. Producto: Versiones de Android: Android kernelAndroid ID: A-111761954References: Upstream kernel.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26\"}]}]}],\"references\":[{\"url\":\"https://source.android.com/security/bulletin/2019-03-01\",\"source\":\"security@android.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4094-1/\",\"source\":\"security@android.com\"},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"security@android.com\"},{\"url\":\"https://source.android.com/security/bulletin/2019-03-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4094-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-rgcg-7mf9-jv5w
Vulnerability from github
Published
2022-05-24 16:48
Modified
2024-04-04 01:01
Severity ?
VLAI Severity ?
Details
In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel
{ "affected": [], "aliases": [ "CVE-2019-2024" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-06-19T21:15:00Z", "severity": "HIGH" }, "details": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "id": "GHSA-rgcg-7mf9-jv5w", "modified": "2024-04-04T01:01:24Z", "published": "2022-05-24T16:48:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2024" }, { "type": "WEB", "url": "https://source.android.com/security/bulletin/2019-03-01" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4094-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4118-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
suse-su-2019:0767-1
Vulnerability from csaf_suse
Published
2019-03-27 09:34
Modified
2019-03-27 09:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise Server 12 SP4 Azure kernel was updated to fix various issues.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166 1128378 1129016).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. (bnc#1123161).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which led to a use-after-free in sockfs_setattr (bnc#1125907 1126284).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).
- CVE-2018-20669: An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c where a local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation (bnc#1122971).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi / video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- add mainline tags for two hyperv iommu patches
- Adjust a commit id in a nvme patch to make our scripts happy
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- alsa: hda - Serialize codec registrations (bsc#1122944).
- alsa: hda - Use standard device registration for beep (bsc#1122944).
- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bonding: update nest level on unlink (git-fixes).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).
- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127577).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- Enable livepatch test drivers in lib/ Livepatch kselftests need those.
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fat: validate ->i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- Fix kabi issues with new transport sharing code (bsc#1114893).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv_uio_generic: map ringbuffer phys addr (bsc#1127577).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- hyperv/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- ib/core: Destroy QP if XRC QP fails (bsc#1046306).
- ib/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- ib/core: Unregister notifier before freeing MAD security (bsc#1046306).
- ib/hfi1: Close race condition on user context disable and close (bsc#1060463).
- ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kABI: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kABI: protect struct sctp_association (kabi).
- kABI: protect struct smc_buf_desc (bnc#1117947, LTC#173662).
- kABI: protect struct smc_link (bnc#1117947, LTC#173662).
- kABI: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- keys: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- kvm: x86: Fix single-step debugging (bsc#1129295).
- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- lsm: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value > 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363)
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).
- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).
- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).
- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).
- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).
- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).
- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).
- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).
- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).
- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).
- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).
- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).
- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).
- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).
- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).
- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).
- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).
- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).
- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).
- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfs: Allow NFSv4 mounts to not share transports ().
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- nfs: support 'nosharetransport' option (bnc#807502, bnc#828192, ).
- nfsv4.1: Fix the r/wsize checking (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- Put the xhci fix patch to the right place in the sorted section
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Reenable iscsi_tcp module (bsc#1127081)
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- remove 2 entries since now we have them, 744889b7cbb56a64f957e65ade7cb65fe3f35714 1adfc5e4136f5967d591c399aff95b3b035f16b7
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Remove conditional support for SMB2 and SMB3:
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'rpm/kernel-binary.spec.in: rename kGraft to KLP ()' This reverts commit f84e065a0c26b5f0777e94ceb67dd494bb7b4d2f. The patch should not have gone to SLE12-SP4. SLE12-SP4 still follows kGraft naming.
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'sd: disable logical block provisioning if 'lbpme' is not set' This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.
- scripts/git_sort/git_sort.py: add vfs 'fixes' branch
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- SCSI: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- [SMB3] Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- [SMB3] Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- supported.conf
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- Thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- uio_hv_generic: defer opening vmbus until first use (bsc#1127577).
- uio_hv_generic: set callbacks on open (bsc#1127577).
- uio: introduce UIO_MEM_IOVA (bsc#1127577).
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req->needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmbus: fix subchannel removal (bsc#1127577).
- vmbus: keep pointer to ring buffer page (bsc#1127577).
- vmbus: pass channel to hv_process_channel_removal (bsc#1127577).
- vmbus: split ring buffer allocation from open (bsc#1127577).
- VMCI: Support upto 64-bit PPNs (bsc#1127286).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- VSOCK: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().
- x86/amd_nb: Add support for newer PCI topologies ().
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- Yama: Check for pid death before checking ancestry (bsc#1051510).
- yam: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
Patchnames
SUSE-2019-767,SUSE-SLE-SERVER-12-SP4-2019-767
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise Server 12 SP4 Azure kernel was updated to fix various issues.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166 1128378 1129016).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which led to a use-after-free in sockfs_setattr (bnc#1125907 1126284).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c where a local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- add mainline tags for two hyperv iommu patches\n- Adjust a commit id in a nvme patch to make our scripts happy\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127577).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- Enable livepatch test drivers in lib/ Livepatch kselftests need those.\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- Fix kabi issues with new transport sharing code (bsc#1114893).\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv_uio_generic: map ringbuffer phys addr (bsc#1127577).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- hyperv/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- ib/core: Destroy QP if XRC QP fails (bsc#1046306).\n- ib/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- ib/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- ib/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kABI: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kABI: protect struct sctp_association (kabi).\n- kABI: protect struct smc_buf_desc (bnc#1117947, LTC#173662).\n- kABI: protect struct smc_link (bnc#1117947, LTC#173662).\n- kABI: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- keys: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- lsm: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363)\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).\n- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).\n- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).\n- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).\n- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).\n- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).\n- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).\n- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).\n- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).\n- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).\n- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).\n- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).\n- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).\n- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).\n- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).\n- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).\n- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).\n- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).\n- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).\n- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfs: Allow NFSv4 mounts to not share transports ().\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfs: support \u0027nosharetransport\u0027 option (bnc#807502, bnc#828192, ).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- Put the xhci fix patch to the right place in the sorted section\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Reenable iscsi_tcp module (bsc#1127081)\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- remove 2 entries since now we have them, 744889b7cbb56a64f957e65ade7cb65fe3f35714 1adfc5e4136f5967d591c399aff95b3b035f16b7\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Remove conditional support for SMB2 and SMB3:\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027rpm/kernel-binary.spec.in: rename kGraft to KLP ()\u0027 This reverts commit f84e065a0c26b5f0777e94ceb67dd494bb7b4d2f. The patch should not have gone to SLE12-SP4. SLE12-SP4 still follows kGraft naming.\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- SCSI: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- [SMB3] Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- [SMB3] Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- supported.conf\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- Thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- uio_hv_generic: defer opening vmbus until first use (bsc#1127577).\n- uio_hv_generic: set callbacks on open (bsc#1127577).\n- uio: introduce UIO_MEM_IOVA (bsc#1127577).\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmbus: fix subchannel removal (bsc#1127577).\n- vmbus: keep pointer to ring buffer page (bsc#1127577).\n- vmbus: pass channel to hv_process_channel_removal (bsc#1127577).\n- vmbus: split ring buffer allocation from open (bsc#1127577).\n- VMCI: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- VSOCK: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().\n- x86/amd_nb: Add support for newer PCI topologies ().\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- Yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-767,SUSE-SLE-SERVER-12-SP4-2019-767", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0767-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0767-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190767-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0767-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117947", "url": "https://bugzilla.suse.com/1117947" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122159", "url": "https://bugzilla.suse.com/1122159" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126284", "url": "https://bugzilla.suse.com/1126284" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127081", "url": "https://bugzilla.suse.com/1127081" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127577", "url": "https://bugzilla.suse.com/1127577" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128378", "url": "https://bugzilla.suse.com/1128378" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129016", "url": "https://bugzilla.suse.com/1129016" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 807502", "url": "https://bugzilla.suse.com/807502" }, { "category": "self", "summary": "SUSE Bug 828192", "url": "https://bugzilla.suse.com/828192" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-27T09:34:13Z", "generator": { "date": "2019-03-27T09:34:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0767-1", "initial_release_date": "2019-03-27T09:34:13Z", "revision_history": [ { "date": "2019-03-27T09:34:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-6.9.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch", "product_id": "kernel-devel-azure-4.12.14-6.9.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-6.9.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch", "product_id": "kernel-source-azure-4.12.14-6.9.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-base-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0801-1
Vulnerability from csaf_suse
Published
2019-03-29 06:09
Modified
2019-03-29 06:09
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.176 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
The following non-security bugs were fixed:
- ax25: fix possible use-after-free (bnc#1012382).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128893).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1012382).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126773).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).
- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- enic: do not overwrite error code (bnc#1012382).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106929)
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- input: mms114 - fix license module information (bsc#1087092).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).
- ixgbe: fix crash in build_skb Rx code path (git-fixes).
- kabi: protect struct inet_peer (kabi).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).
- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).
- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).
- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).
- libceph: handle an empty authorize reply (bsc#1126772).
- mdio_bus: Fix use-after-free on device_register fails (git-fixes).
- mfd: as3722: Handle interrupts on suspend (bnc#1012382).
- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).
- mISDN: fix a race in dev_expire_timer() (bnc#1012382).
- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).
- mlxsw: reg: Use correct offset in field definiton (git-fixes).
- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- net: Add header for usage of fls64() (bnc#1012382).
- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).
- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).
- net: fix IPv6 prefix route residue (bnc#1012382).
- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).
- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).
- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).
- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4: Fix endianness issue in qp context params (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).
- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).
- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).
- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).
- net: qca_spi: Fix race condition in spi transfers (git-fixes).
- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).
- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).
- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).
- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).
- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).
- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).
- pppoe: fix reception of frames with no mac header (git-fixes).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- rdma/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- Revert 'mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL' (bnc#1012382).
- Revert 'x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls' (bsc#1128565).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).
- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).
- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).
- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).
- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).
- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).
- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).
- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- sky2: Increase D3 delay again (bnc#1012382).
- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).
- tcp: tcp_v4_err() should be more careful (bnc#1012382).
- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).
- team: Free BPF filter when unregistering netdev (git-fixes).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).
- vxlan: test dev->flags & IFF_UP before calling netif_rx() (bnc#1012382).
- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT
- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
Patchnames
SUSE-2019-801,SUSE-SLE-DESKTOP-12-SP3-2019-801,SUSE-SLE-HA-12-SP3-2019-801,SUSE-SLE-Live-Patching-12-SP3-2019-801,SUSE-SLE-SDK-12-SP3-2019-801,SUSE-SLE-SERVER-12-SP3-2019-801,SUSE-SLE-WE-12-SP3-2019-801
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.176 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n\nThe following non-security bugs were fixed:\n\n- ax25: fix possible use-after-free (bnc#1012382).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128893).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1012382).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126773).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).\n- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).\n- enic: do not overwrite error code (bnc#1012382).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1106929)\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- input: mms114 - fix license module information (bsc#1087092).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).\n- ixgbe: fix crash in build_skb Rx code path (git-fixes).\n- kabi: protect struct inet_peer (kabi).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).\n- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).\n- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).\n- libceph: handle an empty authorize reply (bsc#1126772).\n- mdio_bus: Fix use-after-free on device_register fails (git-fixes).\n- mfd: as3722: Handle interrupts on suspend (bnc#1012382).\n- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).\n- mISDN: fix a race in dev_expire_timer() (bnc#1012382).\n- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).\n- mlxsw: reg: Use correct offset in field definiton (git-fixes).\n- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- net: Add header for usage of fls64() (bnc#1012382).\n- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).\n- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).\n- net: fix IPv6 prefix route residue (bnc#1012382).\n- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).\n- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).\n- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).\n- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4: Fix endianness issue in qp context params (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).\n- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).\n- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).\n- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).\n- net: qca_spi: Fix race condition in spi transfers (git-fixes).\n- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).\n- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).\n- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).\n- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).\n- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).\n- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).\n- pppoe: fix reception of frames with no mac header (git-fixes).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- rdma/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).\n- Revert \u0027mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL\u0027 (bnc#1012382).\n- Revert \u0027x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls\u0027 (bsc#1128565).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).\n- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).\n- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).\n- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).\n- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).\n- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).\n- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).\n- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- sky2: Increase D3 delay again (bnc#1012382).\n- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).\n- tcp: tcp_v4_err() should be more careful (bnc#1012382).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).\n- team: Free BPF filter when unregistering netdev (git-fixes).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling netif_rx() (bnc#1012382).\n- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT\n- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-801,SUSE-SLE-DESKTOP-12-SP3-2019-801,SUSE-SLE-HA-12-SP3-2019-801,SUSE-SLE-Live-Patching-12-SP3-2019-801,SUSE-SLE-SDK-12-SP3-2019-801,SUSE-SLE-SERVER-12-SP3-2019-801,SUSE-SLE-WE-12-SP3-2019-801", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0801-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0801-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190801-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0801-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005261.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1020413", "url": "https://bugzilla.suse.com/1020413" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070767", "url": "https://bugzilla.suse.com/1070767" }, { "category": "self", "summary": "SUSE Bug 1075697", "url": "https://bugzilla.suse.com/1075697" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1102959", "url": "https://bugzilla.suse.com/1102959" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1106929", "url": "https://bugzilla.suse.com/1106929" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1109248", "url": "https://bugzilla.suse.com/1109248" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120691", "url": "https://bugzilla.suse.com/1120691" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1121713", "url": "https://bugzilla.suse.com/1121713" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125446", "url": "https://bugzilla.suse.com/1125446" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126772", "url": "https://bugzilla.suse.com/1126772" }, { "category": "self", "summary": "SUSE Bug 1126773", "url": "https://bugzilla.suse.com/1126773" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127725", "url": "https://bugzilla.suse.com/1127725" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128452", "url": "https://bugzilla.suse.com/1128452" }, { "category": "self", "summary": "SUSE Bug 1128565", "url": "https://bugzilla.suse.com/1128565" }, { "category": "self", "summary": "SUSE Bug 1128696", "url": "https://bugzilla.suse.com/1128696" }, { "category": "self", "summary": "SUSE Bug 1128756", "url": "https://bugzilla.suse.com/1128756" }, { "category": "self", "summary": "SUSE Bug 1128893", "url": "https://bugzilla.suse.com/1128893" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129237", "url": "https://bugzilla.suse.com/1129237" }, { "category": "self", "summary": "SUSE Bug 1129238", "url": "https://bugzilla.suse.com/1129238" }, { "category": "self", "summary": "SUSE Bug 1129239", "url": "https://bugzilla.suse.com/1129239" }, { "category": "self", "summary": "SUSE Bug 1129240", "url": "https://bugzilla.suse.com/1129240" }, { "category": "self", "summary": "SUSE Bug 1129241", "url": "https://bugzilla.suse.com/1129241" }, { "category": "self", "summary": "SUSE Bug 1129413", "url": "https://bugzilla.suse.com/1129413" }, { "category": "self", "summary": "SUSE Bug 1129414", "url": "https://bugzilla.suse.com/1129414" }, { "category": "self", "summary": "SUSE Bug 1129415", "url": "https://bugzilla.suse.com/1129415" }, { "category": "self", "summary": "SUSE Bug 1129416", "url": "https://bugzilla.suse.com/1129416" }, { "category": "self", "summary": "SUSE Bug 1129417", "url": "https://bugzilla.suse.com/1129417" }, { "category": "self", "summary": "SUSE Bug 1129418", "url": "https://bugzilla.suse.com/1129418" }, { "category": "self", "summary": "SUSE Bug 1129419", "url": "https://bugzilla.suse.com/1129419" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-29T06:09:20Z", "generator": { "date": "2019-03-29T06:09:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0801-1", "initial_release_date": "2019-03-29T06:09:20Z", "revision_history": [ { "date": "2019-03-29T06:09:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.176-94.88.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.176-94.88.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.176-94.88.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.176-94.88.1.aarch64", "product_id": "dlm-kmp-default-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.176-94.88.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.176-94.88.1.aarch64", "product_id": "gfs2-kmp-default-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-default-4.4.176-94.88.1.aarch64", "product_id": "kernel-default-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-default-base-4.4.176-94.88.1.aarch64", "product_id": "kernel-default-base-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-default-devel-4.4.176-94.88.1.aarch64", "product_id": "kernel-default-devel-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-default-extra-4.4.176-94.88.1.aarch64", "product_id": "kernel-default-extra-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.176-94.88.1.aarch64", "product_id": "kernel-default-kgraft-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-obs-build-4.4.176-94.88.1.aarch64", "product_id": "kernel-obs-build-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.176-94.88.1.aarch64", "product_id": "kernel-obs-qa-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-syms-4.4.176-94.88.1.aarch64", "product_id": "kernel-syms-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-vanilla-4.4.176-94.88.1.aarch64", "product_id": "kernel-vanilla-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.176-94.88.1.aarch64", "product_id": "kernel-vanilla-base-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.176-94.88.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.176-94.88.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.176-94.88.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.176-94.88.1.aarch64", "product_id": "kselftests-kmp-default-4.4.176-94.88.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.176-94.88.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.176-94.88.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.176-94.88.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.176-94.88.1.noarch", "product": { "name": "kernel-devel-4.4.176-94.88.1.noarch", "product_id": "kernel-devel-4.4.176-94.88.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.176-94.88.1.noarch", "product": { "name": "kernel-docs-4.4.176-94.88.1.noarch", "product_id": "kernel-docs-4.4.176-94.88.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.176-94.88.1.noarch", "product": { "name": "kernel-docs-html-4.4.176-94.88.1.noarch", "product_id": "kernel-docs-html-4.4.176-94.88.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.176-94.88.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.176-94.88.1.noarch", "product_id": "kernel-docs-pdf-4.4.176-94.88.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.176-94.88.1.noarch", "product": { "name": "kernel-macros-4.4.176-94.88.1.noarch", "product_id": "kernel-macros-4.4.176-94.88.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.176-94.88.1.noarch", "product": { "name": "kernel-source-4.4.176-94.88.1.noarch", "product_id": "kernel-source-4.4.176-94.88.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.176-94.88.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.176-94.88.1.noarch", "product_id": "kernel-source-vanilla-4.4.176-94.88.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.176-94.88.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.176-94.88.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.176-94.88.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.176-94.88.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.176-94.88.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.176-94.88.1.ppc64le", "product_id": "dlm-kmp-default-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.176-94.88.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.176-94.88.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-debug-4.4.176-94.88.1.ppc64le", "product_id": "kernel-debug-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.176-94.88.1.ppc64le", "product_id": "kernel-debug-base-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.176-94.88.1.ppc64le", "product_id": "kernel-debug-devel-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.176-94.88.1.ppc64le", "product_id": "kernel-debug-extra-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.176-94.88.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-default-4.4.176-94.88.1.ppc64le", "product_id": "kernel-default-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-default-base-4.4.176-94.88.1.ppc64le", "product_id": "kernel-default-base-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.176-94.88.1.ppc64le", "product_id": "kernel-default-devel-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.176-94.88.1.ppc64le", "product_id": "kernel-default-extra-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.176-94.88.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.176-94.88.1.ppc64le", "product_id": "kernel-obs-build-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.176-94.88.1.ppc64le", "product_id": "kernel-obs-qa-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-syms-4.4.176-94.88.1.ppc64le", "product_id": "kernel-syms-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.176-94.88.1.ppc64le", "product_id": "kernel-vanilla-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.176-94.88.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.176-94.88.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.176-94.88.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "product": { "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "product_id": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.176-94.88.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.176-94.88.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.176-94.88.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.176-94.88.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.176-94.88.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.176-94.88.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.176-94.88.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.176-94.88.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.176-94.88.1.s390x", "product_id": "cluster-md-kmp-default-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.176-94.88.1.s390x", "product": { "name": "dlm-kmp-default-4.4.176-94.88.1.s390x", "product_id": "dlm-kmp-default-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.176-94.88.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.176-94.88.1.s390x", "product_id": "gfs2-kmp-default-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.176-94.88.1.s390x", "product": { "name": "kernel-default-4.4.176-94.88.1.s390x", "product_id": "kernel-default-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.176-94.88.1.s390x", "product": { "name": "kernel-default-base-4.4.176-94.88.1.s390x", "product_id": "kernel-default-base-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.176-94.88.1.s390x", "product": { "name": "kernel-default-devel-4.4.176-94.88.1.s390x", "product_id": "kernel-default-devel-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.176-94.88.1.s390x", "product": { "name": "kernel-default-extra-4.4.176-94.88.1.s390x", "product_id": "kernel-default-extra-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.176-94.88.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.176-94.88.1.s390x", "product_id": "kernel-default-kgraft-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.176-94.88.1.s390x", "product": { "name": "kernel-default-man-4.4.176-94.88.1.s390x", "product_id": "kernel-default-man-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.176-94.88.1.s390x", "product": { "name": "kernel-obs-build-4.4.176-94.88.1.s390x", "product_id": "kernel-obs-build-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.176-94.88.1.s390x", "product": { "name": "kernel-obs-qa-4.4.176-94.88.1.s390x", "product_id": "kernel-obs-qa-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.176-94.88.1.s390x", "product": { "name": "kernel-syms-4.4.176-94.88.1.s390x", "product_id": "kernel-syms-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.176-94.88.1.s390x", "product": { "name": "kernel-vanilla-4.4.176-94.88.1.s390x", "product_id": "kernel-vanilla-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.176-94.88.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.176-94.88.1.s390x", "product_id": "kernel-vanilla-base-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.176-94.88.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.176-94.88.1.s390x", "product_id": "kernel-vanilla-devel-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.176-94.88.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.176-94.88.1.s390x", "product_id": "kernel-zfcpdump-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.176-94.88.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.176-94.88.1.s390x", "product_id": "kselftests-kmp-default-4.4.176-94.88.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.176-94.88.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.176-94.88.1.s390x", "product_id": "ocfs2-kmp-default-4.4.176-94.88.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.176-94.88.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.176-94.88.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.176-94.88.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.176-94.88.1.x86_64", "product_id": "dlm-kmp-debug-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.176-94.88.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.176-94.88.1.x86_64", "product_id": "dlm-kmp-default-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.176-94.88.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.176-94.88.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.176-94.88.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.176-94.88.1.x86_64", "product_id": "gfs2-kmp-default-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-debug-4.4.176-94.88.1.x86_64", "product_id": "kernel-debug-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-debug-base-4.4.176-94.88.1.x86_64", "product_id": "kernel-debug-base-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.176-94.88.1.x86_64", "product_id": "kernel-debug-devel-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.176-94.88.1.x86_64", "product_id": "kernel-debug-extra-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.176-94.88.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-default-4.4.176-94.88.1.x86_64", "product_id": "kernel-default-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-default-base-4.4.176-94.88.1.x86_64", "product_id": "kernel-default-base-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-default-devel-4.4.176-94.88.1.x86_64", "product_id": "kernel-default-devel-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-default-extra-4.4.176-94.88.1.x86_64", "product_id": "kernel-default-extra-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.176-94.88.1.x86_64", "product_id": "kernel-default-kgraft-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-obs-build-4.4.176-94.88.1.x86_64", "product_id": "kernel-obs-build-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.176-94.88.1.x86_64", "product_id": "kernel-obs-qa-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-syms-4.4.176-94.88.1.x86_64", "product_id": "kernel-syms-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-vanilla-4.4.176-94.88.1.x86_64", "product_id": "kernel-vanilla-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.176-94.88.1.x86_64", "product_id": "kernel-vanilla-base-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.176-94.88.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.176-94.88.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "product": { "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "product_id": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.176-94.88.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.176-94.88.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.176-94.88.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.176-94.88.1.x86_64", "product_id": "kselftests-kmp-default-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.176-94.88.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.176-94.88.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.176-94.88.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-devel-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-macros-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-source-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-syms-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64" }, "product_reference": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-docs-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-obs-build-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-obs-build-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-obs-build-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-obs-build-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-default-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-default-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-default-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-default-base-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-default-base-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-base-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-default-man-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-devel-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-macros-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-source-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-syms-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-syms-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-syms-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-syms-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-default-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-default-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-default-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-default-base-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-default-base-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-base-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-default-man-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-devel-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-macros-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch" }, "product_reference": "kernel-source-4.4.176-94.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64" }, "product_reference": "kernel-syms-4.4.176-94.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le" }, "product_reference": "kernel-syms-4.4.176-94.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x" }, "product_reference": "kernel-syms-4.4.176-94.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-syms-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.176-94.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-29T06:09:20Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-29T06:09:20Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0901-1
Vulnerability from csaf_suse
Published
2019-04-08 09:49
Modified
2019-04-08 09:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.176 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2017-18249: The add_free_nid function in fs/f2fs/node.c did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036).
The following non-security bugs were fixed:
- acpi/nfit: Block function zero DSMs (bsc#1123321).
- acpi, nfit: Fix ARS overflow continuation (bsc#1125000).
- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).
- acpi/nfit: Fix command-supported detection (bsc#1123323).
- acpi: power: Skip duplicate power resource references in _PRx (bnc#1012382).
- acpi / processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).
- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).
- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).
- alsa: compress: Fix stop handling on compressed capture streams (bnc#1012382).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).
- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).
- alsa: hda - Serialize codec registrations (bnc#1012382).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).
- ARC: perf: map generic branches to correct hardware condition (bnc#1012382).
- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).
- arm64: ftrace: do not adjust the LR value (bnc#1012382).
- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).
- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).
- arm64: KVM: Skip MMIO insn after emulation (bnc#1012382).
- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).
- ARM: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).
- ARM: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).
- ARM: dts: da850-evm: Correct the sound card name (bnc#1012382).
- ARM: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).
- ARM: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).
- ARM: dts: mmp2: fix TWSI2 (bnc#1012382).
- ARM: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).
- ARM: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).
- ARM: pxa: avoid section mismatch warning (bnc#1012382).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).
- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).
- ata: Fix racy link clearance (bsc#1107866).
- ax25: fix possible use-after-free (bnc#1012382).
- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).
- batman-adv: Force mac header to start of data on xmit (bnc#1012382).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128893).
- block/loop: Use global lock for ioctl() operation (bnc#1012382).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).
- bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1012382).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).
- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).
- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).
- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).
- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).
- btrfs: validate type when reading a chunk (bnc#1012382).
- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).
- can: bcm: check timer values before ktime conversion (bnc#1012382).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).
- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126773).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: Always resolve hostname before reconnecting (bnc#1012382).
- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).
- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).
- cifs: Do not hide EINTR after sending network packets (bnc#1012382).
- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).
- cifs: Fix potential OOB access of lock element array (bnc#1012382).
- cifs: Limit memory used by lock request calls to a page (bnc#1012382).
- clk: imx6q: reset exclusive gates on init (bnc#1012382).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).
- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).
- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).
- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).
- crypto: cts - fix crash on short inputs (bnc#1012382).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).
- debugfs: fix debugfs_rename parameter checking (bnc#1012382).
- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).
- Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).
- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).
- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).
- dm crypt: factor IV constructor out to separate function (Git-fixes).
- dm crypt: fix crash by adding missing check for auth key size (git-fixes).
- dm crypt: fix error return code in crypt_ctr() (git-fixes).
- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).
- dm crypt: introduce new format of cipher with 'capi:' prefix (Git-fixes).
- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).
- dm: do not allow readahead to limit IO size (git fixes (readahead)).
- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).
- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).
- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).
- Documentation/network: reword kernel version reference (bnc#1012382).
- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).
- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).
- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).
- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).
- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)
- drm/modes: Prevent division by zero htotal (bnc#1012382).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)
- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).
- EDAC: Raise the maximum number of memory controllers (bsc#1120722).
- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- enic: do not overwrite error code (bnc#1012382).
- enic: fix checksum validation for IPv6 (bnc#1012382).
- exec: load_script: do not blindly truncate shebang string (bnc#1012382).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).
- ext4: Fix crash during online resizing (bsc#1122779).
- f2fs: Add sanity_check_inode() function (bnc#1012382).
- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).
- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).
- f2fs: clean up argument of recover_data (bnc#1012382).
- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).
- f2fs: detect wrong layout (bnc#1012382).
- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).
- f2fs: factor out fsync inode entry operations (bnc#1012382).
- f2fs: fix inode cache leak (bnc#1012382).
- f2fs: fix invalid memory access (bnc#1012382).
- f2fs: fix missing up_read (bnc#1012382).
- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).
- f2fs: fix to convert inline directory correctly (bnc#1012382).
- f2fs: fix to determine start_cp_addr by sbi->cur_cp_pack (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).
- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).
- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).
- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).
- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).
- f2fs: fix to do sanity check with user_block_count (bnc#1012382).
- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).
- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).
- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).
- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).
- f2fs: introduce and spread verify_blkaddr (bnc#1012382).
- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).
- f2fs: move dir data flush to write checkpoint process (bnc#1012382).
- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).
- f2fs: not allow to write illegal blkaddr (bnc#1012382).
- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).
- f2fs: read page index before freeing (bnc#1012382).
- f2fs: remove an obsolete variable (bnc#1012382).
- f2fs: return error during fill_super (bnc#1012382).
- f2fs: sanity check on sit entry (bnc#1012382).
- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106929)
- Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).
- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).
- fs/epoll: drop ovflist branch prediction (bnc#1012382).
- fs: fix lost error code in dio_complete (bsc#1117744).
- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).
- fuse: handle zero sized retrieve correctly (bnc#1012382).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bnc#1012382).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bnc#1012382).
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).
- gpio: pl061: handle failed allocations (bnc#1012382).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)
- HID: debug: fix the ring buffer implementation (bnc#1012382).
- HID: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).
- i2c-axxia: check for error conditions first (bnc#1012382).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).
- IB/core: type promotion bug in rdma_rw_init_one_mr() ().
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- IB/rxe: Fix incorrect cache cleanup in error flow ().
- IB/rxe: replace kvfree with vfree ().
- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).
- inet: frags: add a pointer to struct netns_frags (bnc#1012382).
- inet: frags: better deal with smp races (bnc#1012382).
- inet: frags: break the 2GB limit for frags storage (bnc#1012382).
- inet: frags: change inet_frags_init_net() return value (bnc#1012382).
- inet: frags: do not clone skb in ip_expire() (bnc#1012382).
- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).
- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).
- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).
- inet: frags: refactor ipfrag_init() (bnc#1012382).
- inet: frags: refactor ipv6_frag_init() (bnc#1012382).
- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).
- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).
- inet: frags: remove some helpers (bnc#1012382).
- inet: frags: reorganize struct netns_frags (bnc#1012382).
- inet: frags: use rhashtables for reassembly units (bnc#1012382).
- input: bma150 - register input device after setting private data (bnc#1012382).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).
- input: mms114 - fix license module information (bsc#1087092).
- input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).
- intel_pstate: Update frequencies of policy->cpus only from ->set_policy() (bsc#1120017).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).
- ip: add helpers to process in-order fragments faster (bnc#1012382).
- ipfrag: really prevent allocation on netns exit (bnc#1012382).
- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).
- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).
- ip: process in-order fragments efficiently (bnc#1012382).
- ip: use rb trees for IP frag queue (bnc#1012382).
- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).
- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).
- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).
- ixgbe: fix crash in build_skb Rx code path (git-fixes).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).
- kABI: protect linux/kfifo.h include in hid-debug (kabi).
- kABI: protect struct hda_bus (kabi).
- kABI: protect struct inet_peer (kabi).
- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).
- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).
- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).
- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).
- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).
- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).
- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).
- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).
- kvm: VMX: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).
- kvm: VMX: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: Fix single-step debugging (bnc#1012382).
- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).
- kvm: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).
- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).
- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).
- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).
- libceph: handle an empty authorize reply (bsc#1126772).
- libnvdimm: fix ars_status output length calculation (bsc#1124777).
- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).
- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).
- loop: Fold __loop_release into loop_release (bnc#1012382).
- loop: Get rid of loop_index_mutex (bnc#1012382).
- LSM: Check for NULL cred-security on free (bnc#1012382).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).
- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).
- md: batch flush requests (bsc#1119680).
- mdio_bus: Fix use-after-free on device_register fails (git-fixes).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).
- media: em28xx: Fix misplaced reset of dev->v4l::field_count (bnc#1012382).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).
- media: vb2: be sure to unlock mutex on errors (bnc#1012382).
- media: vb2: vb2_mmap: move lock up (bnc#1012382).
- media: vivid: fix error handling of kthread_run (bnc#1012382).
- media: vivid: set min width/height to a value > 0 (bnc#1012382).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).
- mfd: as3722: Handle interrupts on suspend (bnc#1012382).
- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).
- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).
- mISDN: fix a race in dev_expire_timer() (bnc#1012382).
- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).
- mlxsw: reg: Use correct offset in field definiton (git-fixes).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).
- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).
- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).
- mm/page-writeback.c: do not break integrity writeback on ->writepage() error (bnc#1012382).
- mm, proc: be more verbose about unstable VMA flags in /proc/<pid>/smaps (bnc#1012382).
- mm, slab: faster active and free stats (bsc#116653, VM Performance).
- mm/slab: improve performance of gathering slabinfo stats (bsc#116653, VM Performance).
- mm, slab: maintain total slab count instead of active count (bsc#116653, VM Performance).
- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).
- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).
- net: Add header for usage of fls64() (bnc#1012382).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).
- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).
- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).
- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).
- net: dp83640: expire old TX-skb (bnc#1012382).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).
- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).
- net: fix IPv6 prefix route residue (bnc#1012382).
- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).
- net: Fix usage of pskb_trim_rcsum (bnc#1012382).
- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).
- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).
- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).
- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).
- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).
- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).
- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).
- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4: Fix endianness issue in qp context params (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).
- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).
- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).
- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).
- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).
- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).
- net: qca_spi: Fix race condition in spi transfers (git-fixes).
- netrom: switch to sock timer API (bnc#1012382).
- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).
- net_sched: refetch skb protocol for each filter (bnc#1012382).
- net: speed up skb_rbtree_purge() (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).
- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).
- NFC: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).
- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).
- NFS: nfs_compare_mount_options always compare auth flavors (bnc#1012382).
- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).
- ocfs2: do not clear bh uptodate for block read (bnc#1012382).
- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).
- omap2fb: Fix stack memory disclosure (bsc#1106929)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).
- packet: Do not leak dev refcounts on error exit (bnc#1012382).
- pci: altera: Check link status before retrain link (bnc#1012382).
- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).
- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).
- pci: altera: Poll for link training status after retraining the link (bnc#1012382).
- pci: altera: Poll for link up status after retraining the link (bnc#1012382).
- pci: altera: Reorder read/write functions (bnc#1012382).
- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).
- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).
- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).
- perf intel-pt: Fix error with config term 'pt=0' (bnc#1012382).
- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).
- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).
- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).
- perf tools: Add Hygon Dhyana support (bnc#1012382).
- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).
- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).
- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).
- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).
- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).
- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).
- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).
- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).
- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pppoe: fix reception of frames with no mac header (git-fixes).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).
- r8169: Add support for new Realtek Ethernet (bnc#1012382).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).
- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).
- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).
- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- Revert 'cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)' (bnc#1012382).
- Revert 'exec: load_script: do not blindly truncate shebang string' (bnc#1012382).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bnc#1012382).
- Revert 'loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl()' (bnc#1012382).
- Revert 'loop: Fold __loop_release into loop_release' (bnc#1012382).
- Revert 'loop: Get rid of loop_index_mutex' (bnc#1012382).
- Revert 'mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).' The backport patch does not built properly.
- Revert 'mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL' (bnc#1012382).
- Revert 'net: stmmac: Fix a race in EEE enable callback (git-fixes).' This reverts commit f323fa8d233c1f44aff17e6fae90c2c8be30edf9. The patch was already included in stable 4.4.176.
- Revert 'sd: disable logical block provisioning if 'lbpme' is not set' This reverts commit 96370bd87299c7a6883b3e2bf13818f60c8ba611. Patch not accepted upstream.
- Revert 'x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls' (bsc#1128565).
- rhashtable: Add rhashtable_lookup() (bnc#1012382).
- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).
- rhashtable: add schedule points (bnc#1012382).
- rhashtable: reorganize struct rhashtable layout (bnc#1012382).
- s390/early: improve machine detection (bnc#1012382).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).
- sata_rcar: fix deferred probing (bnc#1012382).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).
- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).
- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).
- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).
- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).
- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).
- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).
- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).
- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).
- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).
- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: API's to remove nvme drive from sml (bsc#1117108).
- scsi: mpt3sas: API 's to support NVMe drive addition to SML (bsc#1117108).
- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).
- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).
- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).
- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).
- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).
- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).
- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).
- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).
- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).
- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1117108).
- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).
- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).
- scsi: mpt3sas: fix an out of bound write (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix calltrace observed while running IO & reset (bsc#1117108).
- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).
- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).
- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).
- scsi: mpt3sas: fix format overflow warning (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Fix memory allocation failure test in 'mpt3sas_base_attach()' (bsc#1117108).
- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).
- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).
- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).
- scsi: mpt3sas: fix possible memory leak (bsc#1117108).
- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).
- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).
- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).
- scsi: mpt3sas: fix spelling mistake: 'disbale' -> 'disable' (bsc#1117108).
- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).
- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).
- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1117108).
- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).
- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).
- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).
- scsi: mpt3sas: lockless command submission (bsc#1117108).
- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).
- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).
- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).
- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).
- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).
- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).
- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).
- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).
- scsi: mpt3sas: remove redundant wmb (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).
- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).
- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).
- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).
- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).
- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).
- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).
- scsi: mpt3sas: simplify task management functions (bsc#1117108).
- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).
- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).
- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update MPI Headers (bsc#1117108).
- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mpt3sas: use list_splice_init() (bsc#1117108).
- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).
- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).
- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).
- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).
- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).
- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).
- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).
- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).
- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).
- scsi: sd: Fix cache_type_store() (bnc#1012382).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).
- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selinux: fix GPF on invalid policy (bnc#1012382).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).
- series.conf: Move 'patches.fixes/aio-hold-an-extra-file-reference-over-AIO-read-write.patch' into sorted section.
- signal: Always notice exiting tasks (bnc#1012382).
- signal: Better detection of synchronous signals (bnc#1012382).
- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).
- skge: potential memory corruption in skge_get_regs() (bnc#1012382).
- sky2: Increase D3 delay again (bnc#1012382).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).
- smack: fix access permissions for keyring (bnc#1012382).
- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).
- soc/tegra: Do not leak device tree node reference (bnc#1012382).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).
- staging: iio: ad7780: update voltage on read (bnc#1012382).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).
- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).
- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).
- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).
- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).
- tcp: tcp_v4_err() should be more careful (bnc#1012382).
- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).
- team: Free BPF filter when unregistering netdev (git-fixes).
- test_hexdump: use memcpy instead of strncpy (bnc#1012382).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).
- timekeeping: Use proper seqcount initializer (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).
- tipc: use destination length for copy string (bnc#1012382).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).
- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).
- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).
- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).
- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).
- udf: Fix BUG on corrupted inode (bnc#1012382).
- um: Avoid marking pages with 'changed protection' (bnc#1012382).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).
- usb: dwc2: Remove unnecessary kfree (bnc#1012382).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).
- usb: phy: am335x: fix race condition in _probe (bnc#1012382).
- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).
- usb: storage: add quirk for SMI SM3350 (bnc#1012382).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).
- video: clps711x-fb: release disp device node in probe() (bnc#1012382).
- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).
- vt: invoke notifier on screen size change (bnc#1012382).
- vxlan: test dev->flags & IFF_UP before calling netif_rx() (bnc#1012382).
- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/a.out: Clear the dump structure initially (bnc#1012382).
- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).
- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).
- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).
- xfrm: refine validation of template and selector families (bnc#1012382).
- Yama: Check for pid death before checking ancestry (bnc#1012382).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
Patchnames
SUSE-2019-901,SUSE-SLE-SERVER-12-SP3-2019-901
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.176 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2017-18249: The add_free_nid function in fs/f2fs/node.c did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036).\n\nThe following non-security bugs were fixed:\n\n- acpi/nfit: Block function zero DSMs (bsc#1123321).\n- acpi, nfit: Fix ARS overflow continuation (bsc#1125000).\n- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).\n- acpi/nfit: Fix command-supported detection (bsc#1123323).\n- acpi: power: Skip duplicate power resource references in _PRx (bnc#1012382).\n- acpi / processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).\n- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).\n- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).\n- alsa: compress: Fix stop handling on compressed capture streams (bnc#1012382).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).\n- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).\n- alsa: hda - Serialize codec registrations (bnc#1012382).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).\n- ARC: perf: map generic branches to correct hardware condition (bnc#1012382).\n- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).\n- arm64: ftrace: do not adjust the LR value (bnc#1012382).\n- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).\n- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).\n- arm64: KVM: Skip MMIO insn after emulation (bnc#1012382).\n- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).\n- ARM: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).\n- ARM: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).\n- ARM: dts: da850-evm: Correct the sound card name (bnc#1012382).\n- ARM: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).\n- ARM: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).\n- ARM: dts: mmp2: fix TWSI2 (bnc#1012382).\n- ARM: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).\n- ARM: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).\n- ARM: pxa: avoid section mismatch warning (bnc#1012382).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).\n- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).\n- ata: Fix racy link clearance (bsc#1107866).\n- ax25: fix possible use-after-free (bnc#1012382).\n- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).\n- batman-adv: Force mac header to start of data on xmit (bnc#1012382).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128893).\n- block/loop: Use global lock for ioctl() operation (bnc#1012382).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).\n- bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1012382).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).\n- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).\n- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).\n- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).\n- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).\n- btrfs: validate type when reading a chunk (bnc#1012382).\n- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).\n- can: bcm: check timer values before ktime conversion (bnc#1012382).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).\n- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126773).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: Always resolve hostname before reconnecting (bnc#1012382).\n- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).\n- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).\n- cifs: Do not hide EINTR after sending network packets (bnc#1012382).\n- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).\n- cifs: Fix potential OOB access of lock element array (bnc#1012382).\n- cifs: Limit memory used by lock request calls to a page (bnc#1012382).\n- clk: imx6q: reset exclusive gates on init (bnc#1012382).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).\n- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).\n- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).\n- crypto: cts - fix crash on short inputs (bnc#1012382).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).\n- debugfs: fix debugfs_rename parameter checking (bnc#1012382).\n- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).\n- Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).\n- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).\n- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).\n- dm crypt: factor IV constructor out to separate function (Git-fixes).\n- dm crypt: fix crash by adding missing check for auth key size (git-fixes).\n- dm crypt: fix error return code in crypt_ctr() (git-fixes).\n- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).\n- dm crypt: introduce new format of cipher with \u0027capi:\u0027 prefix (Git-fixes).\n- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).\n- dm: do not allow readahead to limit IO size (git fixes (readahead)).\n- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).\n- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).\n- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).\n- Documentation/network: reword kernel version reference (bnc#1012382).\n- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).\n- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).\n- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).\n- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).\n- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)\n- drm/modes: Prevent division by zero htotal (bnc#1012382).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)\n- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).\n- EDAC: Raise the maximum number of memory controllers (bsc#1120722).\n- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).\n- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).\n- enic: do not overwrite error code (bnc#1012382).\n- enic: fix checksum validation for IPv6 (bnc#1012382).\n- exec: load_script: do not blindly truncate shebang string (bnc#1012382).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- f2fs: Add sanity_check_inode() function (bnc#1012382).\n- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).\n- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).\n- f2fs: clean up argument of recover_data (bnc#1012382).\n- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).\n- f2fs: detect wrong layout (bnc#1012382).\n- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).\n- f2fs: factor out fsync inode entry operations (bnc#1012382).\n- f2fs: fix inode cache leak (bnc#1012382).\n- f2fs: fix invalid memory access (bnc#1012382).\n- f2fs: fix missing up_read (bnc#1012382).\n- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).\n- f2fs: fix to convert inline directory correctly (bnc#1012382).\n- f2fs: fix to determine start_cp_addr by sbi-\u003ecur_cp_pack (bnc#1012382).\n- f2fs: fix to do sanity check with block address in main area (bnc#1012382).\n- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).\n- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).\n- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).\n- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).\n- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).\n- f2fs: fix to do sanity check with user_block_count (bnc#1012382).\n- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).\n- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).\n- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).\n- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).\n- f2fs: introduce and spread verify_blkaddr (bnc#1012382).\n- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).\n- f2fs: move dir data flush to write checkpoint process (bnc#1012382).\n- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).\n- f2fs: not allow to write illegal blkaddr (bnc#1012382).\n- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).\n- f2fs: read page index before freeing (bnc#1012382).\n- f2fs: remove an obsolete variable (bnc#1012382).\n- f2fs: return error during fill_super (bnc#1012382).\n- f2fs: sanity check on sit entry (bnc#1012382).\n- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1106929)\n- Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).\n- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).\n- fs/epoll: drop ovflist branch prediction (bnc#1012382).\n- fs: fix lost error code in dio_complete (bsc#1117744).\n- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).\n- fuse: handle zero sized retrieve correctly (bnc#1012382).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bnc#1012382).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bnc#1012382).\n- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).\n- gpio: pl061: handle failed allocations (bnc#1012382).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)\n- HID: debug: fix the ring buffer implementation (bnc#1012382).\n- HID: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).\n- i2c-axxia: check for error conditions first (bnc#1012382).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).\n- IB/core: type promotion bug in rdma_rw_init_one_mr() ().\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- IB/rxe: Fix incorrect cache cleanup in error flow ().\n- IB/rxe: replace kvfree with vfree ().\n- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).\n- inet: frags: add a pointer to struct netns_frags (bnc#1012382).\n- inet: frags: better deal with smp races (bnc#1012382).\n- inet: frags: break the 2GB limit for frags storage (bnc#1012382).\n- inet: frags: change inet_frags_init_net() return value (bnc#1012382).\n- inet: frags: do not clone skb in ip_expire() (bnc#1012382).\n- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).\n- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).\n- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).\n- inet: frags: refactor ipfrag_init() (bnc#1012382).\n- inet: frags: refactor ipv6_frag_init() (bnc#1012382).\n- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).\n- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).\n- inet: frags: remove some helpers (bnc#1012382).\n- inet: frags: reorganize struct netns_frags (bnc#1012382).\n- inet: frags: use rhashtables for reassembly units (bnc#1012382).\n- input: bma150 - register input device after setting private data (bnc#1012382).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).\n- input: mms114 - fix license module information (bsc#1087092).\n- input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).\n- intel_pstate: Update frequencies of policy-\u003ecpus only from -\u003eset_policy() (bsc#1120017).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).\n- ip: add helpers to process in-order fragments faster (bnc#1012382).\n- ipfrag: really prevent allocation on netns exit (bnc#1012382).\n- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).\n- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).\n- ip: process in-order fragments efficiently (bnc#1012382).\n- ip: use rb trees for IP frag queue (bnc#1012382).\n- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).\n- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).\n- ixgbe: fix crash in build_skb Rx code path (git-fixes).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).\n- kABI: protect linux/kfifo.h include in hid-debug (kabi).\n- kABI: protect struct hda_bus (kabi).\n- kABI: protect struct inet_peer (kabi).\n- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).\n- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).\n- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).\n- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).\n- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).\n- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).\n- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).\n- kvm: VMX: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).\n- kvm: VMX: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: Fix single-step debugging (bnc#1012382).\n- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).\n- kvm: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).\n- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).\n- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).\n- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).\n- libceph: handle an empty authorize reply (bsc#1126772).\n- libnvdimm: fix ars_status output length calculation (bsc#1124777).\n- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).\n- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: Fix double mutex_unlock(\u0026loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).\n- loop: Fold __loop_release into loop_release (bnc#1012382).\n- loop: Get rid of loop_index_mutex (bnc#1012382).\n- LSM: Check for NULL cred-security on free (bnc#1012382).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).\n- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).\n- md: batch flush requests (bsc#1119680).\n- mdio_bus: Fix use-after-free on device_register fails (git-fixes).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).\n- media: em28xx: Fix misplaced reset of dev-\u003ev4l::field_count (bnc#1012382).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).\n- media: vb2: be sure to unlock mutex on errors (bnc#1012382).\n- media: vb2: vb2_mmap: move lock up (bnc#1012382).\n- media: vivid: fix error handling of kthread_run (bnc#1012382).\n- media: vivid: set min width/height to a value \u003e 0 (bnc#1012382).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).\n- mfd: as3722: Handle interrupts on suspend (bnc#1012382).\n- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).\n- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).\n- mISDN: fix a race in dev_expire_timer() (bnc#1012382).\n- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).\n- mlxsw: reg: Use correct offset in field definiton (git-fixes).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).\n- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).\n- mm: only report isolation failures when offlining memory (generic hotplug debugability).\n- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).\n- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).\n- mm/page-writeback.c: do not break integrity writeback on -\u003ewritepage() error (bnc#1012382).\n- mm, proc: be more verbose about unstable VMA flags in /proc/\u0026lt;pid\u003e/smaps (bnc#1012382).\n- mm, slab: faster active and free stats (bsc#116653, VM Performance).\n- mm/slab: improve performance of gathering slabinfo stats (bsc#116653, VM Performance).\n- mm, slab: maintain total slab count instead of active count (bsc#116653, VM Performance).\n- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).\n- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).\n- net: Add header for usage of fls64() (bnc#1012382).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).\n- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).\n- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).\n- net: dp83640: expire old TX-skb (bnc#1012382).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).\n- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).\n- net: fix IPv6 prefix route residue (bnc#1012382).\n- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).\n- net: Fix usage of pskb_trim_rcsum (bnc#1012382).\n- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).\n- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).\n- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).\n- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).\n- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).\n- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).\n- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).\n- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4: Fix endianness issue in qp context params (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).\n- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).\n- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).\n- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).\n- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).\n- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).\n- net: qca_spi: Fix race condition in spi transfers (git-fixes).\n- netrom: switch to sock timer API (bnc#1012382).\n- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).\n- net_sched: refetch skb protocol for each filter (bnc#1012382).\n- net: speed up skb_rbtree_purge() (bnc#1012382).\n- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).\n- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).\n- NFC: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).\n- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).\n- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).\n- NFS: nfs_compare_mount_options always compare auth flavors (bnc#1012382).\n- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).\n- ocfs2: do not clear bh uptodate for block read (bnc#1012382).\n- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).\n- omap2fb: Fix stack memory disclosure (bsc#1106929)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).\n- packet: Do not leak dev refcounts on error exit (bnc#1012382).\n- pci: altera: Check link status before retrain link (bnc#1012382).\n- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).\n- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).\n- pci: altera: Poll for link training status after retraining the link (bnc#1012382).\n- pci: altera: Poll for link up status after retraining the link (bnc#1012382).\n- pci: altera: Reorder read/write functions (bnc#1012382).\n- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).\n- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).\n- perf intel-pt: Fix error with config term \u0027pt=0\u0027 (bnc#1012382).\n- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).\n- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).\n- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).\n- perf tools: Add Hygon Dhyana support (bnc#1012382).\n- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).\n- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).\n- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).\n- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).\n- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).\n- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).\n- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).\n- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).\n- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pppoe: fix reception of frames with no mac header (git-fixes).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).\n- r8169: Add support for new Realtek Ethernet (bnc#1012382).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).\n- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).\n- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).\n- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).\n- Revert \u0027bs-upload-kernel: do not set %opensuse_bs\u0027 This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.\n- Revert \u0027cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)\u0027 (bnc#1012382).\n- Revert \u0027exec: load_script: do not blindly truncate shebang string\u0027 (bnc#1012382).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bnc#1012382).\n- Revert \u0027loop: Fix double mutex_unlock(\u0026loop_ctl_mutex) in loop_control_ioctl()\u0027 (bnc#1012382).\n- Revert \u0027loop: Fold __loop_release into loop_release\u0027 (bnc#1012382).\n- Revert \u0027loop: Get rid of loop_index_mutex\u0027 (bnc#1012382).\n- Revert \u0027mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).\u0027 The backport patch does not built properly.\n- Revert \u0027mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL\u0027 (bnc#1012382).\n- Revert \u0027net: stmmac: Fix a race in EEE enable callback (git-fixes).\u0027 This reverts commit f323fa8d233c1f44aff17e6fae90c2c8be30edf9. The patch was already included in stable 4.4.176.\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit 96370bd87299c7a6883b3e2bf13818f60c8ba611. Patch not accepted upstream.\n- Revert \u0027x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls\u0027 (bsc#1128565).\n- rhashtable: Add rhashtable_lookup() (bnc#1012382).\n- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).\n- rhashtable: add schedule points (bnc#1012382).\n- rhashtable: reorganize struct rhashtable layout (bnc#1012382).\n- s390/early: improve machine detection (bnc#1012382).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).\n- sata_rcar: fix deferred probing (bnc#1012382).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).\n- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).\n- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).\n- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).\n- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).\n- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).\n- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).\n- scsi: mpt3sas: Add ioc_\u0026lt;level\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).\n- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).\n- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).\n- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).\n- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: API\u0027s to remove nvme drive from sml (bsc#1117108).\n- scsi: mpt3sas: API \u0027s to support NVMe drive addition to SML (bsc#1117108).\n- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).\n- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).\n- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).\n- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).\n- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).\n- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).\n- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).\n- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u0026lt;level\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u0026lt;level\u003e with MPT3SAS_FMT to ioc_\u0026lt;level\u003e (bsc#1117108).\n- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).\n- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).\n- scsi: mpt3sas: Do not access the structure after decrementing it\u0027s instance reference count (bsc#1117108).\n- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).\n- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).\n- scsi: mpt3sas: fix an out of bound write (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix calltrace observed while running IO \u0026 reset (bsc#1117108).\n- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).\n- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).\n- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).\n- scsi: mpt3sas: fix format overflow warning (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Fix memory allocation failure test in \u0027mpt3sas_base_attach()\u0027 (bsc#1117108).\n- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).\n- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).\n- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).\n- scsi: mpt3sas: fix possible memory leak (bsc#1117108).\n- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).\n- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).\n- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).\n- scsi: mpt3sas: fix spelling mistake: \u0027disbale\u0027 -\u003e \u0027disable\u0027 (bsc#1117108).\n- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).\n- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).\n- scsi: mpt3sas: Increase event log buffer to support 24 port HBA\u0027s (bsc#1117108).\n- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).\n- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).\n- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).\n- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).\n- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).\n- scsi: mpt3sas: lockless command submission (bsc#1117108).\n- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).\n- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).\n- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).\n- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).\n- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).\n- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).\n- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).\n- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).\n- scsi: mpt3sas: remove redundant wmb (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).\n- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).\n- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).\n- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).\n- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).\n- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).\n- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).\n- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).\n- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).\n- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).\n- scsi: mpt3sas: simplify task management functions (bsc#1117108).\n- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).\n- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).\n- scsi: mpt3sas: Update driver version \u002725.100.00.00\u0027 (bsc#1117108).\n- scsi: mpt3sas: Update driver version \u002726.100.00.00\u0027 (bsc#1117108).\n- scsi: mpt3sas: Update MPI Headers (bsc#1117108).\n- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mpt3sas: use list_splice_init() (bsc#1117108).\n- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).\n- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).\n- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).\n- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).\n- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).\n- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).\n- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).\n- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).\n- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).\n- scsi: sd: Fix cache_type_store() (bnc#1012382).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).\n- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selinux: fix GPF on invalid policy (bnc#1012382).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).\n- series.conf: Move \u0027patches.fixes/aio-hold-an-extra-file-reference-over-AIO-read-write.patch\u0027 into sorted section.\n- signal: Always notice exiting tasks (bnc#1012382).\n- signal: Better detection of synchronous signals (bnc#1012382).\n- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).\n- skge: potential memory corruption in skge_get_regs() (bnc#1012382).\n- sky2: Increase D3 delay again (bnc#1012382).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).\n- smack: fix access permissions for keyring (bnc#1012382).\n- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).\n- soc/tegra: Do not leak device tree node reference (bnc#1012382).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).\n- staging: iio: ad7780: update voltage on read (bnc#1012382).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).\n- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).\n- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).\n- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).\n- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).\n- tcp: tcp_v4_err() should be more careful (bnc#1012382).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).\n- team: Free BPF filter when unregistering netdev (git-fixes).\n- test_hexdump: use memcpy instead of strncpy (bnc#1012382).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).\n- timekeeping: Use proper seqcount initializer (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).\n- tipc: use destination length for copy string (bnc#1012382).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).\n- tty: Do not block on IO when ldisc change is pending (bnc#1105428).\n- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).\n- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).\n- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).\n- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).\n- tty: Simplify tty-\u003ecount math in tty_reopen() (bnc#1105428).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).\n- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).\n- udf: Fix BUG on corrupted inode (bnc#1012382).\n- um: Avoid marking pages with \u0027changed protection\u0027 (bnc#1012382).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).\n- usb: dwc2: Remove unnecessary kfree (bnc#1012382).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).\n- usb: phy: am335x: fix race condition in _probe (bnc#1012382).\n- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).\n- usb: storage: add quirk for SMI SM3350 (bnc#1012382).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).\n- video: clps711x-fb: release disp device node in probe() (bnc#1012382).\n- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).\n- vt: invoke notifier on screen size change (bnc#1012382).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling netif_rx() (bnc#1012382).\n- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bnc#1012382).\n- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).\n- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).\n- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).\n- xfrm: refine validation of template and selector families (bnc#1012382).\n- Yama: Check for pid death before checking ancestry (bnc#1012382).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-901,SUSE-SLE-SERVER-12-SP3-2019-901", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0901-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0901-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190901-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0901-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1020413", "url": "https://bugzilla.suse.com/1020413" }, { "category": "self", "summary": "SUSE Bug 1023175", "url": "https://bugzilla.suse.com/1023175" }, { "category": "self", "summary": "SUSE Bug 1031492", "url": "https://bugzilla.suse.com/1031492" }, { "category": "self", "summary": "SUSE Bug 1042286", "url": "https://bugzilla.suse.com/1042286" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070767", "url": "https://bugzilla.suse.com/1070767" }, { "category": "self", "summary": "SUSE Bug 1075697", "url": "https://bugzilla.suse.com/1075697" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1087036", "url": "https://bugzilla.suse.com/1087036" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1099810", "url": "https://bugzilla.suse.com/1099810" }, { "category": "self", "summary": "SUSE Bug 1102875", "url": "https://bugzilla.suse.com/1102875" }, { "category": "self", "summary": "SUSE Bug 1102877", "url": "https://bugzilla.suse.com/1102877" }, { "category": "self", "summary": "SUSE Bug 1102879", "url": "https://bugzilla.suse.com/1102879" }, { "category": "self", "summary": "SUSE Bug 1102882", "url": "https://bugzilla.suse.com/1102882" }, { "category": "self", "summary": "SUSE Bug 1102896", "url": "https://bugzilla.suse.com/1102896" }, { "category": "self", "summary": "SUSE Bug 1102959", "url": "https://bugzilla.suse.com/1102959" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1105428", "url": "https://bugzilla.suse.com/1105428" }, { "category": "self", "summary": "SUSE Bug 1106061", "url": "https://bugzilla.suse.com/1106061" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106929", "url": "https://bugzilla.suse.com/1106929" }, { "category": "self", "summary": "SUSE Bug 1107866", "url": "https://bugzilla.suse.com/1107866" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1109248", "url": "https://bugzilla.suse.com/1109248" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1116345", "url": "https://bugzilla.suse.com/1116345" }, { "category": "self", "summary": "SUSE Bug 1116653", "url": "https://bugzilla.suse.com/1116653" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117744", "url": "https://bugzilla.suse.com/1117744" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119680", "url": "https://bugzilla.suse.com/1119680" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120017", "url": "https://bugzilla.suse.com/1120017" }, { "category": "self", "summary": "SUSE Bug 1120691", "url": "https://bugzilla.suse.com/1120691" }, { "category": "self", "summary": "SUSE Bug 1120722", "url": "https://bugzilla.suse.com/1120722" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1121713", "url": "https://bugzilla.suse.com/1121713" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122650", "url": "https://bugzilla.suse.com/1122650" }, { "category": "self", "summary": "SUSE Bug 1122651", "url": "https://bugzilla.suse.com/1122651" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1123321", "url": "https://bugzilla.suse.com/1123321" }, { "category": "self", "summary": "SUSE Bug 1123323", "url": "https://bugzilla.suse.com/1123323" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124166", "url": "https://bugzilla.suse.com/1124166" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124775", "url": "https://bugzilla.suse.com/1124775" }, { "category": "self", "summary": "SUSE Bug 1124777", "url": "https://bugzilla.suse.com/1124777" }, { "category": "self", "summary": "SUSE Bug 1124780", "url": "https://bugzilla.suse.com/1124780" }, { "category": "self", "summary": "SUSE Bug 1124811", "url": "https://bugzilla.suse.com/1124811" }, { "category": "self", "summary": "SUSE Bug 1125000", "url": "https://bugzilla.suse.com/1125000" }, { "category": "self", "summary": "SUSE Bug 1125014", "url": "https://bugzilla.suse.com/1125014" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125446", "url": "https://bugzilla.suse.com/1125446" }, { "category": "self", "summary": "SUSE Bug 1125794", "url": "https://bugzilla.suse.com/1125794" }, { "category": "self", "summary": "SUSE Bug 1125796", "url": "https://bugzilla.suse.com/1125796" }, { "category": "self", "summary": "SUSE Bug 1125808", "url": "https://bugzilla.suse.com/1125808" }, { "category": "self", "summary": "SUSE Bug 1125809", "url": "https://bugzilla.suse.com/1125809" }, { "category": "self", "summary": "SUSE Bug 1125810", "url": "https://bugzilla.suse.com/1125810" }, { "category": "self", "summary": "SUSE Bug 1125892", "url": "https://bugzilla.suse.com/1125892" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126772", "url": "https://bugzilla.suse.com/1126772" }, { "category": "self", "summary": "SUSE Bug 1126773", "url": "https://bugzilla.suse.com/1126773" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127725", "url": "https://bugzilla.suse.com/1127725" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128452", "url": "https://bugzilla.suse.com/1128452" }, { "category": "self", "summary": "SUSE Bug 1128565", "url": "https://bugzilla.suse.com/1128565" }, { "category": "self", "summary": "SUSE Bug 1128696", "url": "https://bugzilla.suse.com/1128696" }, { "category": "self", "summary": "SUSE Bug 1128756", "url": "https://bugzilla.suse.com/1128756" }, { "category": "self", "summary": "SUSE Bug 1128893", "url": "https://bugzilla.suse.com/1128893" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129237", "url": "https://bugzilla.suse.com/1129237" }, { "category": "self", "summary": "SUSE Bug 1129238", "url": "https://bugzilla.suse.com/1129238" }, { "category": "self", "summary": "SUSE Bug 1129239", "url": "https://bugzilla.suse.com/1129239" }, { "category": "self", "summary": "SUSE Bug 1129240", "url": "https://bugzilla.suse.com/1129240" }, { "category": "self", "summary": "SUSE Bug 1129241", "url": "https://bugzilla.suse.com/1129241" }, { "category": "self", "summary": "SUSE Bug 1129413", "url": "https://bugzilla.suse.com/1129413" }, { "category": "self", "summary": "SUSE Bug 1129414", "url": "https://bugzilla.suse.com/1129414" }, { "category": "self", "summary": "SUSE Bug 1129415", "url": "https://bugzilla.suse.com/1129415" }, { "category": "self", "summary": "SUSE Bug 1129416", "url": "https://bugzilla.suse.com/1129416" }, { "category": "self", "summary": "SUSE Bug 1129417", "url": "https://bugzilla.suse.com/1129417" }, { "category": "self", "summary": "SUSE Bug 1129418", "url": "https://bugzilla.suse.com/1129418" }, { "category": "self", "summary": "SUSE Bug 1129419", "url": "https://bugzilla.suse.com/1129419" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18249 page", "url": "https://www.suse.com/security/cve/CVE-2017-18249/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-04-08T09:49:53Z", "generator": { "date": "2019-04-08T09:49:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0901-1", "initial_release_date": "2019-04-08T09:49:53Z", "revision_history": [ { "date": "2019-04-08T09:49:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.4.176-4.25.1.noarch", "product": { "name": "kernel-devel-azure-4.4.176-4.25.1.noarch", "product_id": "kernel-devel-azure-4.4.176-4.25.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.4.176-4.25.1.noarch", "product": { "name": "kernel-source-azure-4.4.176-4.25.1.noarch", "product_id": "kernel-source-azure-4.4.176-4.25.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "cluster-md-kmp-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "dlm-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "dlm-kmp-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "gfs2-kmp-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-base-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-base-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-devel-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-devel-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-extra-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-extra-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-kgraft-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-kgraft-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-syms-azure-4.4.176-4.25.1.x86_64", "product_id": "kernel-syms-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "kselftests-kmp-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "ocfs2-kmp-azure-4.4.176-4.25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-base-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-devel-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.4.176-4.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch" }, "product_reference": "kernel-devel-azure-4.4.176-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.4.176-4.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch" }, "product_reference": "kernel-source-azure-4.4.176-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-syms-azure-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-base-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-devel-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.4.176-4.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch" }, "product_reference": "kernel-devel-azure-4.4.176-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.4.176-4.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch" }, "product_reference": "kernel-source-azure-4.4.176-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-syms-azure-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18249" } ], "notes": [ { "category": "general", "text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18249", "url": "https://www.suse.com/security/cve/CVE-2017-18249" }, { "category": "external", "summary": "SUSE Bug 1087036 for CVE-2017-18249", "url": "https://bugzilla.suse.com/1087036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2017-18249" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0828-1
Vulnerability from csaf_suse
Published
2019-04-01 09:28
Modified
2019-04-01 09:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829).
- CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732).
- CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728).
The following non-security bugs were fixed:
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758).
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145).
- scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
Patchnames
SUSE-2019-828,SUSE-OpenStack-Cloud-7-2019-828,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-828,SUSE-SLE-HA-12-SP2-2019-828,SUSE-SLE-SAP-12-SP2-2019-828,SUSE-SLE-SERVER-12-SP2-2019-828,SUSE-SLE-SERVER-12-SP2-BCL-2019-828,SUSE-Storage-4-2019-828
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829).\n- CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732).\n- CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728).\n\nThe following non-security bugs were fixed:\n\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).\n- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758).\n- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145).\n- scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- xen-netfront: Fix hang on device removal (bnc#1012382).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-828,SUSE-OpenStack-Cloud-7-2019-828,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-828,SUSE-SLE-HA-12-SP2-2019-828,SUSE-SLE-SAP-12-SP2-2019-828,SUSE-SLE-SERVER-12-SP2-2019-828,SUSE-SLE-SERVER-12-SP2-BCL-2019-828,SUSE-Storage-4-2019-828", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0828-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0828-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190828-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0828-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1075697", "url": "https://bugzilla.suse.com/1075697" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1098599", "url": "https://bugzilla.suse.com/1098599" }, { "category": "self", "summary": "SUSE Bug 1102959", "url": "https://bugzilla.suse.com/1102959" }, { "category": "self", "summary": "SUSE Bug 1105402", "url": "https://bugzilla.suse.com/1105402" }, { "category": "self", "summary": "SUSE Bug 1107829", "url": "https://bugzilla.suse.com/1107829" }, { "category": "self", "summary": "SUSE Bug 1108145", "url": "https://bugzilla.suse.com/1108145" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1109330", "url": "https://bugzilla.suse.com/1109330" }, { "category": "self", "summary": "SUSE Bug 1110286", "url": "https://bugzilla.suse.com/1110286" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1120691", "url": "https://bugzilla.suse.com/1120691" }, { "category": "self", "summary": "SUSE Bug 1121698", "url": "https://bugzilla.suse.com/1121698" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122821", "url": "https://bugzilla.suse.com/1122821" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1127758", "url": "https://bugzilla.suse.com/1127758" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-04-01T09:28:05Z", "generator": { "date": "2019-04-01T09:28:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0828-1", "initial_release_date": "2019-04-01T09:28:05Z", "revision_history": [ { "date": "2019-04-01T09:28:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.104.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.104.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.104.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.104.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.104.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.104.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.104.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.104.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.104.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.104.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.104.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.104.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.104.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.104.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.104.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.104.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.104.1.aarch64", "product_id": "kernel-default-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.104.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.104.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.104.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.104.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.104.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.104.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.104.1.aarch64", "product_id": "kernel-syms-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.104.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.104.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.104.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.104.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.104.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.104.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.104.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.104.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.104.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.104.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.104.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.104.1.noarch", "product_id": "kernel-devel-4.4.121-92.104.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.104.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.104.1.noarch", "product_id": "kernel-docs-4.4.121-92.104.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.104.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.104.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.104.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.104.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.104.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.104.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.104.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.104.1.noarch", "product_id": "kernel-macros-4.4.121-92.104.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.104.1.noarch", "product": { "name": "kernel-source-4.4.121-92.104.1.noarch", "product_id": "kernel-source-4.4.121-92.104.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.104.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.104.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.104.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.104.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.104.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.104.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.104.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.104.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.104.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.104.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.104.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.104.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.104.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.104.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.104.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.104.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.104.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.104.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.104.1.ppc64le", "product_id": "kernel-default-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.104.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.104.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.104.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.104.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.104.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.104.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.104.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.104.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.104.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.104.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.104.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.104.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.104.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.104.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.104.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.104.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.104.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.104.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.104.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.104.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.104.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.104.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.104.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.104.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.104.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.104.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.104.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.104.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.104.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.104.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.104.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.104.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.104.1.s390x", "product": { "name": "kernel-default-4.4.121-92.104.1.s390x", "product_id": "kernel-default-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.104.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.104.1.s390x", "product_id": "kernel-default-base-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.104.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.104.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.104.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.104.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.104.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.104.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.104.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.104.1.s390x", "product_id": "kernel-default-man-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.104.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.104.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.104.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.104.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.104.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.104.1.s390x", "product_id": "kernel-syms-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.104.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.104.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.104.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.104.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.104.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.104.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.104.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.104.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.104.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.104.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.104.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.104.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.104.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.104.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.104.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.104.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.104.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.104.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.104.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.104.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.104.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.104.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.104.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.104.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.104.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.104.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.104.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.104.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.104.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.104.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.104.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.104.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.104.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.104.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.104.1.x86_64", "product_id": "kernel-debug-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.104.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.104.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.104.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.104.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.104.1.x86_64", "product_id": "kernel-default-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.104.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.104.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.104.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.104.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.104.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.104.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.104.1.x86_64", "product_id": "kernel-syms-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.104.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.104.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.104.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.104.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.104.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.104.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.104.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.104.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.104.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.104.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.104.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.104.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.104.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.104.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.104.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.104.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.104.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.104.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.104.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.104.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.104.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.104.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.104.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.104.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.104.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-01T09:28:05Z", "details": "moderate" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-01T09:28:05Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-01T09:28:05Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-01T09:28:05Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-01T09:28:05Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.104.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.104.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.104.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_104-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-01T09:28:05Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0765-1
Vulnerability from csaf_suse
Published
2019-03-26 17:00
Modified
2019-03-26 17:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. (bnc#1123161).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728 ).
- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi / video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- alsa: hda - Serialize codec registrations (bsc#1122944).
- alsa: hda - Use standard device registration for beep (bsc#1122944).
- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: kvm: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: kvm: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bonding: update nest level on unlink (git-fixes).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in smb 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on smb2+ (bsc#1051510).
- cifs: Add support for writing attributes on smb2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for smb2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For smb2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fanotify: fix handling of events on child sub-directory (bsc#1122019).
- fat: validate ->i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- Fix kabi issues with new transport sharing code (bsc#1114893).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of smbus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- IB/core: Destroy QP if XRC QP fails (bsc#1046306).
- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).
- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).
- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A acpi Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add acpi ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable smbus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kabi: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kabi: protect struct sctp_association (kabi).
- kabi: protect struct smc_buf_desc (bnc#1117947, LTC#173662).
- kabi: protect struct smc_link (bnc#1117947, LTC#173662).
- kabi: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- keys: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- kvm: x86: Fix single-step debugging (bsc#1129295).
- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- LSM: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value > 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363) patches.arch/x86-add-tsx-force-abort-cpuid-msr
- Move the upstreamed HD-audio fix into sorted section
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).
- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).
- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).
- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).
- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).
- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).
- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).
- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).
- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).
- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).
- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).
- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).
- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).
- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).
- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).
- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).
- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).
- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).
- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).
- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfs: Allow NFSv4 mounts to not share transports ().
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- nfs: support 'nosharetransport' option (bnc#807502, bnc#828192, ).
- nfsv4.1: Fix the r/wsize checking (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- Put the xhci fix patch to the right place in the sorted section
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send smb3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- smb3: Improve security, move default dialect to smb3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- smb3: Remove ifdef since smb3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for smb3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- Update config files. Remove conditional support for smb2 and SMB3:
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req->needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmci: Support upto 64-bit PPNs (bsc#1127286).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().
- x86/amd_nb: Add support for newer PCI topologies ().
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- Yama: Check for pid death before checking ancestry (bsc#1051510).
- yam: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
Patchnames
SUSE-2019-765,SUSE-SLE-DESKTOP-12-SP4-2019-765,SUSE-SLE-HA-12-SP4-2019-765,SUSE-SLE-Live-Patching-12-SP4-2019-765,SUSE-SLE-SDK-12-SP4-2019-765,SUSE-SLE-SERVER-12-SP4-2019-765,SUSE-SLE-WE-12-SP4-2019-765
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728 ).\n- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: kvm: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: kvm: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in smb 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on smb2+ (bsc#1051510).\n- cifs: Add support for writing attributes on smb2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for smb2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For smb2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- Fix kabi issues with new transport sharing code (bsc#1114893).\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of smbus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A acpi Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add acpi ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable smbus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kabi: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kabi: protect struct sctp_association (kabi).\n- kabi: protect struct smc_buf_desc (bnc#1117947, LTC#173662).\n- kabi: protect struct smc_link (bnc#1117947, LTC#173662).\n- kabi: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- keys: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363) patches.arch/x86-add-tsx-force-abort-cpuid-msr\n- Move the upstreamed HD-audio fix into sorted section\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).\n- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).\n- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).\n- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).\n- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).\n- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).\n- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).\n- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).\n- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).\n- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).\n- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).\n- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).\n- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).\n- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).\n- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).\n- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).\n- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).\n- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).\n- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).\n- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfs: Allow NFSv4 mounts to not share transports ().\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfs: support \u0027nosharetransport\u0027 option (bnc#807502, bnc#828192, ).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- Put the xhci fix patch to the right place in the sorted section\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send smb3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to smb3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since smb3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for smb3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- Update config files. Remove conditional support for smb2 and SMB3:\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmci: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().\n- x86/amd_nb: Add support for newer PCI topologies ().\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- Yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-765,SUSE-SLE-DESKTOP-12-SP4-2019-765,SUSE-SLE-HA-12-SP4-2019-765,SUSE-SLE-Live-Patching-12-SP4-2019-765,SUSE-SLE-SDK-12-SP4-2019-765,SUSE-SLE-SERVER-12-SP4-2019-765,SUSE-SLE-WE-12-SP4-2019-765", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0765-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0765-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190765-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0765-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1074562", "url": "https://bugzilla.suse.com/1074562" }, { "category": "self", "summary": "SUSE Bug 1074578", "url": "https://bugzilla.suse.com/1074578" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1075006", "url": "https://bugzilla.suse.com/1075006" }, { "category": "self", "summary": "SUSE Bug 1075419", "url": "https://bugzilla.suse.com/1075419" }, { "category": "self", "summary": "SUSE Bug 1075748", "url": "https://bugzilla.suse.com/1075748" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1080039", "url": "https://bugzilla.suse.com/1080039" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087084", "url": "https://bugzilla.suse.com/1087084" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1087939", "url": "https://bugzilla.suse.com/1087939" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1102055", "url": "https://bugzilla.suse.com/1102055" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113769", "url": "https://bugzilla.suse.com/1113769" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117947", "url": "https://bugzilla.suse.com/1117947" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122159", "url": "https://bugzilla.suse.com/1122159" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122292", "url": "https://bugzilla.suse.com/1122292" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 807502", "url": "https://bugzilla.suse.com/807502" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE Bug 828192", "url": "https://bugzilla.suse.com/828192" }, { "category": "self", "summary": "SUSE Bug 925178", "url": "https://bugzilla.suse.com/925178" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-26T17:00:55Z", "generator": { "date": "2019-03-26T17:00:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0765-1", "initial_release_date": "2019-03-26T17:00:55Z", "revision_history": [ { "date": "2019-03-26T17:00:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-al-4.12.14-95.13.1.aarch64", "product_id": "dtb-al-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-95.13.1.aarch64", "product_id": "dtb-allwinner-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-altera-4.12.14-95.13.1.aarch64", "product_id": "dtb-altera-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-amd-4.12.14-95.13.1.aarch64", "product_id": "dtb-amd-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-95.13.1.aarch64", "product_id": "dtb-amlogic-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-apm-4.12.14-95.13.1.aarch64", "product_id": "dtb-apm-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-arm-4.12.14-95.13.1.aarch64", "product_id": "dtb-arm-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-95.13.1.aarch64", "product_id": "dtb-broadcom-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-95.13.1.aarch64", "product_id": "dtb-cavium-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-95.13.1.aarch64", "product_id": "dtb-exynos-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-95.13.1.aarch64", "product_id": "dtb-freescale-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-95.13.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-lg-4.12.14-95.13.1.aarch64", "product_id": "dtb-lg-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-95.13.1.aarch64", "product_id": "dtb-marvell-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-95.13.1.aarch64", "product_id": "dtb-mediatek-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-95.13.1.aarch64", "product_id": "dtb-nvidia-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-95.13.1.aarch64", "product_id": "dtb-qcom-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-95.13.1.aarch64", "product_id": "dtb-renesas-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-95.13.1.aarch64", "product_id": "dtb-rockchip-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-95.13.1.aarch64", "product_id": "dtb-socionext-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-95.13.1.aarch64", "product_id": "dtb-sprd-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-95.13.1.aarch64", "product_id": "dtb-xilinx-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-zte-4.12.14-95.13.1.aarch64", "product_id": "dtb-zte-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.13.1.aarch64", "product_id": "kernel-syms-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.13.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.13.1.noarch", "product_id": "kernel-devel-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.13.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.13.1.noarch", "product_id": "kernel-docs-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.13.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.13.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.13.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.13.1.noarch", "product_id": "kernel-macros-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.13.1.noarch", "product": { "name": "kernel-source-4.12.14-95.13.1.noarch", "product_id": "kernel-source-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.13.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.13.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-extra-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-extra-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-4.12.14-95.13.1.s390x", "product_id": "kernel-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.13.1.s390x", "product_id": "kernel-default-base-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.13.1.s390x", "product_id": "kernel-default-man-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.13.1.s390x", "product_id": "kernel-syms-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.13.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.13.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "dlm-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "dlm-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-extra-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-extra-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.13.1.x86_64", "product_id": "kernel-syms-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-docs-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0784-1
Vulnerability from csaf_suse
Published
2019-03-28 07:46
Modified
2019-03-28 07:46
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).
- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- ACPI/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi / video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- add mainline tags for two hyperv iommu patches
- Adjust a commit id in a nvme patch to make our scripts happy
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- ALSA: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- ALSA: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- ALSA: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- ALSA: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- ALSA: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- ALSA: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- ALSA: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- ALSA: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- ALSA: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- ALSA: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- ALSA: hda - Serialize codec registrations (bsc#1122944).
- ALSA: hda - Use standard device registration for beep (bsc#1122944).
- ALSA: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- ALSA: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- ALSA: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bonding: update nest level on unlink (git-fixes).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).
- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- Cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- Delete patches.fixes/block-loop-Use-global-lock-for-ioctl-operation.patch: It makes existing deadlocks much more probable (bsc#1129739).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fanotify: fix handling of events on child sub-directory (bsc#1122019).
- fat: validate ->i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- IB/core: Destroy QP if XRC QP fails (bsc#1046306).
- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).
- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).
- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kabi: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kabi: protect struct sctp_association (kabi).
- kabi: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kabi workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kabi workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kabi workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- KEYS: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- kvm: x86: Fix single-step debugging (bsc#1129295).
- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- LSM: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value > 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- Move the upstreamed HD-audio fix into sorted section
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- nfsv4.1: Fix the r/wsize checking (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'sd: disable logical block provisioning if 'lbpme' is not set' This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.
- scripts/git_sort/git_sort.py: add vfs 'fixes' branch
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- Update config files. Remove conditional support for SMB2 and SMB3:
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req->needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmci: Support upto 64-bit PPNs (bsc#1127286).
- vscok: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- yama: Check for pid death before checking ancestry (bsc#1051510).
- yama: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
Patchnames
SUSE-2019-784,SUSE-SLE-Module-Basesystem-15-2019-784,SUSE-SLE-Module-Development-Tools-15-2019-784,SUSE-SLE-Module-Development-Tools-OBS-15-2019-784,SUSE-SLE-Module-Legacy-15-2019-784,SUSE-SLE-Module-Live-Patching-15-2019-784,SUSE-SLE-Product-HA-15-2019-784,SUSE-SLE-Product-WE-15-2019-784
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- ACPI/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- add mainline tags for two hyperv iommu patches\n- Adjust a commit id in a nvme patch to make our scripts happy\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- ALSA: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- ALSA: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- ALSA: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- ALSA: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- ALSA: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- ALSA: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- ALSA: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- ALSA: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- ALSA: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- ALSA: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- ALSA: hda - Serialize codec registrations (bsc#1122944).\n- ALSA: hda - Use standard device registration for beep (bsc#1122944).\n- ALSA: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- ALSA: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- Cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- Delete patches.fixes/block-loop-Use-global-lock-for-ioctl-operation.patch: It makes existing deadlocks much more probable (bsc#1129739).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u0026lt; mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kabi: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kabi: protect struct sctp_association (kabi).\n- kabi: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kabi workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kabi workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kabi workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- KEYS: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Move the upstreamed HD-audio fix into sorted section\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- Update config files. Remove conditional support for SMB2 and SMB3:\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmci: Support upto 64-bit PPNs (bsc#1127286).\n- vscok: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- yama: Check for pid death before checking ancestry (bsc#1051510).\n- yama: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-784,SUSE-SLE-Module-Basesystem-15-2019-784,SUSE-SLE-Module-Development-Tools-15-2019-784,SUSE-SLE-Module-Development-Tools-OBS-15-2019-784,SUSE-SLE-Module-Legacy-15-2019-784,SUSE-SLE-Module-Live-Patching-15-2019-784,SUSE-SLE-Product-HA-15-2019-784,SUSE-SLE-Product-WE-15-2019-784", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0784-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0784-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0784-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-28T07:46:41Z", "generator": { "date": "2019-03-28T07:46:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0784-1", "initial_release_date": "2019-03-28T07:46:41Z", "revision_history": [ { "date": "2019-03-28T07:46:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-al-4.12.14-150.14.1.aarch64", "product_id": "dtb-al-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-150.14.1.aarch64", "product_id": "dtb-allwinner-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-altera-4.12.14-150.14.1.aarch64", "product_id": "dtb-altera-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-amd-4.12.14-150.14.1.aarch64", "product_id": "dtb-amd-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-150.14.1.aarch64", "product_id": "dtb-amlogic-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-apm-4.12.14-150.14.1.aarch64", "product_id": "dtb-apm-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-arm-4.12.14-150.14.1.aarch64", "product_id": "dtb-arm-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-150.14.1.aarch64", "product_id": "dtb-broadcom-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-150.14.1.aarch64", "product_id": "dtb-cavium-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-150.14.1.aarch64", "product_id": "dtb-exynos-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-150.14.1.aarch64", "product_id": "dtb-freescale-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-150.14.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-lg-4.12.14-150.14.1.aarch64", "product_id": "dtb-lg-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-150.14.1.aarch64", "product_id": "dtb-marvell-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-150.14.1.aarch64", "product_id": "dtb-mediatek-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-150.14.1.aarch64", "product_id": "dtb-nvidia-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-150.14.1.aarch64", "product_id": "dtb-qcom-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-150.14.1.aarch64", "product_id": "dtb-renesas-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-150.14.1.aarch64", "product_id": "dtb-rockchip-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-150.14.1.aarch64", "product_id": "dtb-socionext-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-150.14.1.aarch64", "product_id": "dtb-sprd-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-150.14.1.aarch64", "product_id": "dtb-xilinx-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-zte-4.12.14-150.14.1.aarch64", "product_id": "dtb-zte-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-base-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-devel-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-extra-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.aarch64", "product_id": "kernel-obs-build-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.14.1.aarch64", "product_id": "kernel-syms-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.14.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.14.1.noarch", "product_id": "kernel-devel-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.14.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.14.1.noarch", "product_id": "kernel-docs-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.14.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.14.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.14.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.14.1.noarch", "product_id": "kernel-macros-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.14.1.noarch", "product": { "name": "kernel-source-4.12.14-150.14.1.noarch", "product_id": "kernel-source-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.14.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.14.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.14.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-extra-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-extra-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.14.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.14.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.s390x", "product_id": "dlm-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-4.12.14-150.14.2.s390x", "product_id": "kernel-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-base-4.12.14-150.14.2.s390x", "product_id": "kernel-default-base-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.s390x", "product_id": "kernel-default-devel-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.s390x", "product_id": "kernel-default-extra-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-man-4.12.14-150.14.2.s390x", "product_id": "kernel-default-man-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.s390x", "product_id": "kernel-obs-build-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.s390x", "product_id": "kernel-obs-qa-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.14.1.s390x", "product_id": "kernel-syms-4.12.14-150.14.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "dlm-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "dlm-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-extra-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-extra-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-extra-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "product_id": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.x86_64", "product_id": "kernel-obs-build-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.14.1.x86_64", "product_id": "kernel-syms-4.12.14-150.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.14.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0785-1
Vulnerability from csaf_suse
Published
2019-03-28 10:19
Modified
2019-03-28 10:19
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. (bnc#1123161).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: The KVM implementation had a Use-after-Free problem (bnc#1124732).
- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).
- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi/nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi/numa: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi/power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi/video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi/video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- alsa: hda - Serialize codec registrations (bsc#1122944).
- alsa: hda - Use standard device registration for beep (bsc#1122944).
- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- Bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- Bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).
- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- doc/README.SUSE: Correct description for building a kernel (bsc#1123348) The obsoleted make cloneconfig is corrected. Also the order of make scripts and make prepare are corrected as well.
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- Drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- Drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127578).
- Drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fanotify: fix handling of events on child sub-directory (bsc#1122019).
- fat: validate ->i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- HID: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv_uio_generic: map ringbuffer phys addr (bsc#1127578).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- IB/core: Destroy QP if XRC QP fails (bsc#1046306).
- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).
- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).
- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kABI: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kABI: protect struct sctp_association (kabi).
- kABI: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- KEYS: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- KVM: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- KVM: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- KVM: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- KVM: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- KVM: x86: Fix single-step debugging (bsc#1129295).
- KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- LSM: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value > 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- NFS: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- NFSv4.1: Fix the r/wsize checking (git-fixes).
- NFSv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- PCI: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- PCI: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.
- scripts/git_sort/git_sort.py: add vfs 'fixes' branch
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- The PCI SSID matches with other machine(s?) on the market, and leads to the boot problem. (bsc#1122554)
- There are no more #ifdef checking these macros.
- Thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- uio_hv_generic: defer opening vmbus until first use (bsc#1127578).
- uio_hv_generic: set callbacks on open (bsc#1127578).
- uio: introduce UIO_MEM_IOVA (bsc#1127578).
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req->needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmbus: fix subchannel removal (bsc#1127578).
- vmbus: keep pointer to ring buffer page (bsc#1127578).
- vmbus: pass channel to hv_process_channel_removal (bsc#1127578).
- vmbus: split ring buffer allocation from open (bsc#1127578).
- VMCI: Support upto 64-bit PPNs (bsc#1127286).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- yama: Check for pid death before checking ancestry (bsc#1051510).
- yam: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
Patchnames
SUSE-2019-785,SUSE-SLE-Module-Public-Cloud-15-2019-785
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: The KVM implementation had a Use-after-Free problem (bnc#1124732).\n- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi/nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi/numa: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi/power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi/video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi/video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- Bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- Bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348) The obsoleted make cloneconfig is corrected. Also the order of make scripts and make prepare are corrected as well.\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- Drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- Drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127578).\n- Drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- HID: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv_uio_generic: map ringbuffer phys addr (bsc#1127578).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kABI: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kABI: protect struct sctp_association (kabi).\n- kABI: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- KEYS: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- KVM: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- KVM: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- KVM: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- KVM: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- KVM: x86: Fix single-step debugging (bsc#1129295).\n- KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- NFS: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- NFSv4.1: Fix the r/wsize checking (git-fixes).\n- NFSv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- PCI: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- PCI: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- The PCI SSID matches with other machine(s?) on the market, and leads to the boot problem. (bsc#1122554) \n- There are no more #ifdef checking these macros.\n- Thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- uio_hv_generic: defer opening vmbus until first use (bsc#1127578).\n- uio_hv_generic: set callbacks on open (bsc#1127578).\n- uio: introduce UIO_MEM_IOVA (bsc#1127578).\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmbus: fix subchannel removal (bsc#1127578).\n- vmbus: keep pointer to ring buffer page (bsc#1127578).\n- vmbus: pass channel to hv_process_channel_removal (bsc#1127578).\n- vmbus: split ring buffer allocation from open (bsc#1127578).\n- VMCI: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-785,SUSE-SLE-Module-Public-Cloud-15-2019-785", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0785-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0785-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0785-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127578", "url": "https://bugzilla.suse.com/1127578" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-28T10:19:30Z", "generator": { "date": "2019-03-28T10:19:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0785-1", "initial_release_date": "2019-03-28T10:19:30Z", "revision_history": [ { "date": "2019-03-28T10:19:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-5.24.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-5.24.1.noarch", "product_id": "kernel-devel-azure-4.12.14-5.24.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-5.24.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-5.24.1.noarch", "product_id": "kernel-source-azure-4.12.14-5.24.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-base-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-5.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-5.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-5.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-5.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
gsd-2019-2024
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-2024", "description": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "id": "GSD-2019-2024", "references": [ "https://www.suse.com/security/cve/CVE-2019-2024.html", "https://ubuntu.com/security/CVE-2019-2024" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-2024" ], "details": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "id": "GSD-2019-2024", "modified": "2023-12-13T01:23:44.950519Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2019-2024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Android", "version": { "version_data": [ { "version_value": "Android kernel" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2019-03-01", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2019-03-01" }, { "name": "USN-4094-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4118-1/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2019-2024" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2019-03-01", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2019-03-01" }, { "name": "USN-4094-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4118-1/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-08-13T19:15Z", "publishedDate": "2019-06-19T21:15Z" } } }
fkie_cve-2019-2024
Vulnerability from fkie_nvd
Published
2019-06-19 21:15
Modified
2024-11-21 04:40
Severity ?
Summary
In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel
References
▶ | URL | Tags | |
---|---|---|---|
security@android.com | https://source.android.com/security/bulletin/2019-03-01 | Vendor Advisory | |
security@android.com | https://usn.ubuntu.com/4094-1/ | ||
security@android.com | https://usn.ubuntu.com/4118-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2019-03-01 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4094-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4118-1/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel" }, { "lang": "es", "value": "En em28xx_unregister_dvb of em28xx-dvb.c, existe un posible uso de memoria previamente liberada. Esto conllevar\u00eda a una escalada local de privilegios sin necesidad de privilegios adicionales de ejecuci\u00f3n. No es necesaria la interacci\u00f3n del usuario para su funci\u00f3n. Producto: Versiones de Android: Android kernelAndroid ID: A-111761954References: Upstream kernel." } ], "id": "CVE-2019-2024", "lastModified": "2024-11-21T04:40:05.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-19T21:15:10.697", "references": [ { "source": "security@android.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2019-03-01" }, { "source": "security@android.com", "url": "https://usn.ubuntu.com/4094-1/" }, { "source": "security@android.com", "url": "https://usn.ubuntu.com/4118-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2019-03-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4094-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4118-1/" } ], "sourceIdentifier": "security@android.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2019:1193-1
Vulnerability from csaf_opensuse
Published
2019-04-12 06:18
Modified
2019-04-12 06:18
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.0 was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-3819: A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
The following non-security bugs were fixed:
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi / video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: echoaudio: add a check for ioremap_nocache (bsc#1051510).
- alsa: firewire: add const qualifier to identifiers for read-only symbols (bsc#1051510).
- alsa: firewire-motu: add a flag for AES/EBU on XLR interface (bsc#1051510).
- alsa: firewire-motu: add specification flag for position of flag for MIDI messages (bsc#1051510).
- alsa: firewire-motu: add support for MOTU Audio Express (bsc#1051510).
- alsa: firewire-motu: add support for Motu Traveler (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- alsa: firewire-motu: use 'version' field of unit directory to identify model (bsc#1051510).
- alsa: hda - add Lenovo IdeaCentre B550 to the power_save_blacklist (bsc#1051510).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- alsa: hda - Enforces runtime_resume after S3 and S4 for each codec (bsc#1051510).
- alsa: hda/realtek - Add support for Acer Aspire E5-523G/ES1-432 headset mic (bsc#1051510).
- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable ASUS X441MB and X705FD headset MIC with ALC256 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- alsa: hda/realtek: Enable headset MIC of Acer AIO with ALC286 (bsc#1051510).
- alsa: hda/realtek: Enable headset MIC of Acer Aspire Z24-890 with ALC286 (bsc#1051510).
- alsa: hda/realtek: Enable headset mic of ASUS P5440FF with ALC256 (bsc#1051510).
- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- alsa: hda - Record the current power state before suspend/resume calls (bsc#1051510).
- alsa: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bsc#1051510).
- alsa: pcm: Do not suspend stream in unrecoverable PCM state (bsc#1051510).
- alsa: pcm: Fix possible OOB access in PCM oss plugins (bsc#1051510).
- alsa: rawmidi: Fix potential Spectre v1 vulnerability (bsc#1051510).
- alsa: sb8: add a check for request_region (bsc#1051510).
- alsa: seq: oss: Fix Spectre v1 vulnerability (bsc#1051510).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- auxdisplay: hd44780: Fix memory leak on ->remove() (bsc#1051510).
- auxdisplay: ht16k33: fix potential user-after-free on module unload (bsc#1051510).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- bluetooth: Fix decrementing reference count twice in releasing socket (bsc#1051510).
- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bluetooth: hci_ldisc: Initialize hci_dev before open() (bsc#1051510).
- bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto() (bsc#1051510).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock between clone/dedupe and rename (bsc#1130518).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: allow guest mounts to work for smb3.11 (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: clk-twl6040: Fix imprecise external abort for pdmclk (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: ingenic: Fix doc of ingenic_cgu_div_info (bsc#1051510).
- clk: ingenic: Fix round_rate misbehaving with non-integer dividers (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: sunxi-ng: v3s: Fix TCON reset de-assert bit (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vc5: Abort clock configuration without upstream clock (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Clear timer interrupt when shutdown (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/exynos_mct: Move one-shot check from tick clear to ISR (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpcap-charger: generate events for userspace (bsc#1051510).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: pxa2xx: remove incorrect __init annotation (bsc#1051510).
- cpufreq: tegra124: add missing of_node_put() (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1051510).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- Do not log confusing message on reconnect by default (bsc#1129664).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915/bios: assume eDP is present on port A when there is no VBT (bsc#1051510).
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Relax mmap VMA check (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/imx: ignore plane updates on disabled crtcs (bsc#1051510).
- drm/imx: imx-ldb: add missing of_node_puts (bsc#1051510).
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau/debugfs: Fix check of pm_runtime_get_sync failure (bsc#1051510).
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- Enable livepatch test drivers in lib/ Livepatch kselftests need those.
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: Avoid panic during forced reboot (bsc#1126356).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fs/dax: deposit pagetable even when installing zero page (bsc#1126740).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv: reduce storvsc_ringbuffer_size from 1M to 128K to simplify booting with 1k vcpus ().
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i2c: tegra: fix maximum transfer size (bsc#1051510).
- ib/core: Destroy QP if XRC QP fails (bsc#1046306).
- ib/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- ib/core: Unregister notifier before freeing MAD security (bsc#1046306).
- ib/hfi1: Close race condition on user context disable and close (bsc#1060463).
- ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- Input: bma150 - register input device after setting private data (bsc#1051510).
- input: cap11xx - switch to using set_brightness_blocking() (bsc#1051510).
- Input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- Input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- Input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: matrix_keypad - use flush_delayed_work() (bsc#1051510).
- Input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: st-keyscan - fix potential zalloc NULL dereference (bsc#1051510).
- input: uinput - fix undefined behavior in uinput_validate_absinfo() (bsc#1120902).
- Input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Fix NULL dereference bug in match_hid_uid (bsc#1130336).
- iommu/amd: fix sg->dma_address for sg->offset bigger than PAGE_SIZE (bsc#1130337).
- iommu/amd: Reserve exclusion range in iova-domain (bsc#1130425).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu: Do not print warning when IOMMU driver only supports unmanaged domains (bsc#1130130).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check capability before disabling protected memory (bsc#1130338).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6: fix PMTU discovery when using /127 subnets (git-fixes).
- ip6mr: Do not call __IP6_INC_STATS() from preemptible context (git-fixes).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4/route: fail early when inet dev is missing (git-fixes).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Avoid parsing _indirect_ twice for Device table (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- irqchip/mmp: Only touch the PJ4 IRQ & FIQ bits on enable/disable (bsc#1051510).
- iscsi_ibft: Fix missing break in switch statement (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix firmware statistics usage (bsc#1129770).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kabi: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kabi workaround for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kasan: fix shadow_size calculation error in kasan_module_alloc (bsc#1051510).
- kbuild: fix false positive warning/error about missing libelf (bsc#1051510).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- keys: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: Fix single-step debugging (bsc#1129295).
- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- libceph: wait for latest osdmap in ceph_monc_blacklist_add() (bsc#1130427).
- lib/div64.c: off by one in shift (bsc#1051510).
- libertas_tf: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Fix Tx aggregation session tear down with ITXQs (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211_hwsim: propagate genlmsg_reply return code (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: rc: mce_kbd decoder: fix stuck keys (bsc#1100132).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2-ctrls.c/uvc: zero v4l2_event (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1119086).
- memremap: fix softlockup reports at teardown (bnc#1130154).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: pxamci: fix enum type confusion (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm: Fix modifying of page protection by insert_pfn() (bsc#1126740).
- mm: Fix warning in insert_pfn() (bsc#1126740).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- Move upstreamed ALSA and BT patches into sorted section
- Move upstreamed libnvdimm patch into sorted section
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129276 bsc#1125342).
- netfilter: check for seqadj ext existence before adding it in nf_nat_setup_info (git-fixes).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net/ncsi: Fix AEN HNCDSC packet length (git-fixes).
- net/ncsi: Stop monitor if channel times out or is inactive (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net-sysfs: Fix mem leak in netdev_register_kobject (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfsd: fix memory corruption caused by readdir (bsc#1127445).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- nvme: schedule requeue whenever a LIVE state is entered (bsc#1123105).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- pci: designware-ep: dw_pcie_ep_set_msi() should only set MMC bits (bsc#1051510).
- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci/pme: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- pm / wakeup: Rework wakeup source timer cancellation (bsc#1051510).
- powercap: intel_rapl: add support for Jacobsville ().
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- power: supply: charger-manager: Fix incorrect return value (bsc#1051510).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- pwm-backlight: Enable/disable the PWM before/after LCD enable toggle (bsc#1051510).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: apply SET_DTR quirk to Sierra WP7607 (bsc#1051510).
- qmi_wwan: Fix qmap header retrieval in qmimux_rx_fixup (bsc#1051510).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: max77620: Initialize values for DT properties (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mpa01: Fix step values for some LDOs (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Remove patches rejected upstream ().
- Revert drm/i915 patches that caused regressions (bsc#1131062)
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'ipv4: keep skb->dst around in presence of IP options' (git-fixes).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'sd: disable logical block provisioning if 'lbpme' is not set' This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rhashtable: Still do rehash when we get EEXIST (bsc#1051510).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtc: 88pm80x: fix unintended sign extension (bsc#1051510).
- rtc: 88pm860x: fix unintended sign extension (bsc#1051510).
- rtc: cmos: ignore bogus century byte (bsc#1051510).
- rtc: ds1672: fix unintended sign extension (bsc#1051510).
- rtc: Fix overflow when converting time64_t to rtc_time (bsc#1051510).
- rtc: pm8xxx: fix unintended sign extension (bsc#1051510).
- rtnetlink: bring NETDEV_CHANGE_TX_QUEUE_LEN event process back in rtnetlink_event (git-fixes).
- rtnetlink: bring NETDEV_CHANGEUPPER event process back in rtnetlink_event (git-fixes).
- rtnetlink: bring NETDEV_POST_TYPE_CHANGE event process back in rtnetlink_event (git-fixes).
- rtnetlink: check DO_SETLINK_NOTIFY correctly in do_setlink (git-fixes).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- sata_rcar: fix deferred probing (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scripts/git_sort/git_sort.py: add vfs 'fixes' branch
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bsc#1127378).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selinux: always allow mounting submounts (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_of: assume reg-shift of 2 for mrvl,mmp-uart (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: fsl_lpuart: fix maximum acceptable baud rate with over-sampling (bsc#1051510).
- serial: imx: Update cached mctrl value when changing RTS (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc: fsl: qbman: avoid race in clearing QMan interrupt (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- spi: pxa2xx: Setup maximum supported DMA transfer length (bsc#1051510).
- spi: ti-qspi: Fix mmap read when more than one CS in use (bsc#1051510).
- spi/topcliff_pch: Fix potential NULL dereference on allocation error (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- supported.conf
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- svm: Fix improper check when deactivate AVIC (bsc#1130335).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- thermal: bcm2835: Fix crash in bcm2835_thermal_debugfs (bsc#1051510).
- thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal/intel_powerclamp: fix truncated kthread name ().
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: Fix some name collisions with drivers/char/tpm.h (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm_tis_spi: Pass the SPI IRQ down to the driver (bsc#1051510).
- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- uio: Reduce return paths from uio_write() (bsc#1051510).
- Update config files. Remove conditional support for SMB2 and SMB3:
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).
- usb: common: Consider only available nodes for dr_mode (bsc#1129770).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: core: only clean up what we allocated (bsc#1051510).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Fix the uninitialized link_state when udc starts (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: gadget: synchronize_irq dwc irq in suspend (bsc#1051510).
- usb: gadget: f_hid: fix deadlock in f_hidg_write() (bsc#1129770).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: Potential NULL dereference on allocation error (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: phy: fix link errors (bsc#1051510).
- usb: phy: twl6030-usb: fix possible use-after-free on remove (bsc#1051510).
- usb: serial: cp210x: add ID for Ingenico 3070 (bsc#1129770).
- usb: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485 (bsc#1129770).
- usb: serial: mos7720: fix mos_parport refcount imbalance on error path (bsc#1129770).
- usb: serial: option: add Telit ME910 ECM composition (bsc#1129770).
- usb: serial: option: set driver_info for SIM5218 and compatibles (bsc#1129770).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmci: Support upto 64-bit PPNs (bsc#1127286).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/cpu: Add Atom Tremont (Jacobsville) ().
- x86/CPU/AMD: Set the CPB bit unconditionally on F17h (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
- yama: Check for pid death before checking ancestry (bsc#1051510).
- yam: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114279).
Patchnames
openSUSE-2019-1193
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.0 was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-3819: A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n\nThe following non-security bugs were fixed:\n\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: echoaudio: add a check for ioremap_nocache (bsc#1051510).\n- alsa: firewire: add const qualifier to identifiers for read-only symbols (bsc#1051510).\n- alsa: firewire-motu: add a flag for AES/EBU on XLR interface (bsc#1051510).\n- alsa: firewire-motu: add specification flag for position of flag for MIDI messages (bsc#1051510).\n- alsa: firewire-motu: add support for MOTU Audio Express (bsc#1051510).\n- alsa: firewire-motu: add support for Motu Traveler (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: firewire-motu: use \u0027version\u0027 field of unit directory to identify model (bsc#1051510).\n- alsa: hda - add Lenovo IdeaCentre B550 to the power_save_blacklist (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda - Enforces runtime_resume after S3 and S4 for each codec (bsc#1051510).\n- alsa: hda/realtek - Add support for Acer Aspire E5-523G/ES1-432 headset mic (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable ASUS X441MB and X705FD headset MIC with ALC256 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek: Enable headset MIC of Acer AIO with ALC286 (bsc#1051510).\n- alsa: hda/realtek: Enable headset MIC of Acer Aspire Z24-890 with ALC286 (bsc#1051510).\n- alsa: hda/realtek: Enable headset mic of ASUS P5440FF with ALC256 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda - Record the current power state before suspend/resume calls (bsc#1051510).\n- alsa: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bsc#1051510).\n- alsa: pcm: Do not suspend stream in unrecoverable PCM state (bsc#1051510).\n- alsa: pcm: Fix possible OOB access in PCM oss plugins (bsc#1051510).\n- alsa: rawmidi: Fix potential Spectre v1 vulnerability (bsc#1051510).\n- alsa: sb8: add a check for request_region (bsc#1051510).\n- alsa: seq: oss: Fix Spectre v1 vulnerability (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- auxdisplay: hd44780: Fix memory leak on -\u003eremove() (bsc#1051510).\n- auxdisplay: ht16k33: fix potential user-after-free on module unload (bsc#1051510).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- bluetooth: Fix decrementing reference count twice in releasing socket (bsc#1051510).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bluetooth: hci_ldisc: Initialize hci_dev before open() (bsc#1051510).\n- bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto() (bsc#1051510).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock between clone/dedupe and rename (bsc#1130518).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: allow guest mounts to work for smb3.11 (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: clk-twl6040: Fix imprecise external abort for pdmclk (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: ingenic: Fix doc of ingenic_cgu_div_info (bsc#1051510).\n- clk: ingenic: Fix round_rate misbehaving with non-integer dividers (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: sunxi-ng: v3s: Fix TCON reset de-assert bit (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vc5: Abort clock configuration without upstream clock (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Clear timer interrupt when shutdown (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/exynos_mct: Move one-shot check from tick clear to ISR (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpcap-charger: generate events for userspace (bsc#1051510).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: pxa2xx: remove incorrect __init annotation (bsc#1051510).\n- cpufreq: tegra124: add missing of_node_put() (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915/bios: assume eDP is present on port A when there is no VBT (bsc#1051510).\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Relax mmap VMA check (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/imx: ignore plane updates on disabled crtcs (bsc#1051510).\n- drm/imx: imx-ldb: add missing of_node_puts (bsc#1051510).\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau/debugfs: Fix check of pm_runtime_get_sync failure (bsc#1051510).\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- Enable livepatch test drivers in lib/ Livepatch kselftests need those.\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: Avoid panic during forced reboot (bsc#1126356).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fs/dax: deposit pagetable even when installing zero page (bsc#1126740).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u0026lt; mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv: reduce storvsc_ringbuffer_size from 1M to 128K to simplify booting with 1k vcpus ().\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i2c: tegra: fix maximum transfer size (bsc#1051510).\n- ib/core: Destroy QP if XRC QP fails (bsc#1046306).\n- ib/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- ib/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- ib/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- Input: bma150 - register input device after setting private data (bsc#1051510).\n- input: cap11xx - switch to using set_brightness_blocking() (bsc#1051510).\n- Input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- Input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- Input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: matrix_keypad - use flush_delayed_work() (bsc#1051510).\n- Input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: st-keyscan - fix potential zalloc NULL dereference (bsc#1051510).\n- input: uinput - fix undefined behavior in uinput_validate_absinfo() (bsc#1120902).\n- Input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Fix NULL dereference bug in match_hid_uid (bsc#1130336).\n- iommu/amd: fix sg-\u003edma_address for sg-\u003eoffset bigger than PAGE_SIZE (bsc#1130337).\n- iommu/amd: Reserve exclusion range in iova-domain (bsc#1130425).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu: Do not print warning when IOMMU driver only supports unmanaged domains (bsc#1130130).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check capability before disabling protected memory (bsc#1130338).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6: fix PMTU discovery when using /127 subnets (git-fixes).\n- ip6mr: Do not call __IP6_INC_STATS() from preemptible context (git-fixes).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4/route: fail early when inet dev is missing (git-fixes).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Avoid parsing _indirect_ twice for Device table (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- irqchip/mmp: Only touch the PJ4 IRQ \u0026 FIQ bits on enable/disable (bsc#1051510).\n- iscsi_ibft: Fix missing break in switch statement (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix firmware statistics usage (bsc#1129770).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kabi: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kabi workaround for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kasan: fix shadow_size calculation error in kasan_module_alloc (bsc#1051510).\n- kbuild: fix false positive warning/error about missing libelf (bsc#1051510).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- keys: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- libceph: wait for latest osdmap in ceph_monc_blacklist_add() (bsc#1130427).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libertas_tf: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Fix Tx aggregation session tear down with ITXQs (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211_hwsim: propagate genlmsg_reply return code (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: rc: mce_kbd decoder: fix stuck keys (bsc#1100132).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2-ctrls.c/uvc: zero v4l2_event (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1119086).\n- memremap: fix softlockup reports at teardown (bnc#1130154).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: pxamci: fix enum type confusion (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm: Fix modifying of page protection by insert_pfn() (bsc#1126740).\n- mm: Fix warning in insert_pfn() (bsc#1126740).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Move upstreamed ALSA and BT patches into sorted section\n- Move upstreamed libnvdimm patch into sorted section\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129276 bsc#1125342).\n- netfilter: check for seqadj ext existence before adding it in nf_nat_setup_info (git-fixes).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net/ncsi: Fix AEN HNCDSC packet length (git-fixes).\n- net/ncsi: Stop monitor if channel times out or is inactive (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net-sysfs: Fix mem leak in netdev_register_kobject (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfsd: fix memory corruption caused by readdir (bsc#1127445).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- nvme: schedule requeue whenever a LIVE state is entered (bsc#1123105).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- pci: designware-ep: dw_pcie_ep_set_msi() should only set MMC bits (bsc#1051510).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/pme: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- pm / wakeup: Rework wakeup source timer cancellation (bsc#1051510).\n- powercap: intel_rapl: add support for Jacobsville ().\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- power: supply: charger-manager: Fix incorrect return value (bsc#1051510).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- pwm-backlight: Enable/disable the PWM before/after LCD enable toggle (bsc#1051510).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: apply SET_DTR quirk to Sierra WP7607 (bsc#1051510).\n- qmi_wwan: Fix qmap header retrieval in qmimux_rx_fixup (bsc#1051510).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: max77620: Initialize values for DT properties (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mpa01: Fix step values for some LDOs (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Remove patches rejected upstream ().\n- Revert drm/i915 patches that caused regressions (bsc#1131062)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027ipv4: keep skb-\u003edst around in presence of IP options\u0027 (git-fixes).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rhashtable: Still do rehash when we get EEXIST (bsc#1051510).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtc: 88pm80x: fix unintended sign extension (bsc#1051510).\n- rtc: 88pm860x: fix unintended sign extension (bsc#1051510).\n- rtc: cmos: ignore bogus century byte (bsc#1051510).\n- rtc: ds1672: fix unintended sign extension (bsc#1051510).\n- rtc: Fix overflow when converting time64_t to rtc_time (bsc#1051510).\n- rtc: pm8xxx: fix unintended sign extension (bsc#1051510).\n- rtnetlink: bring NETDEV_CHANGE_TX_QUEUE_LEN event process back in rtnetlink_event (git-fixes).\n- rtnetlink: bring NETDEV_CHANGEUPPER event process back in rtnetlink_event (git-fixes).\n- rtnetlink: bring NETDEV_POST_TYPE_CHANGE event process back in rtnetlink_event (git-fixes).\n- rtnetlink: check DO_SETLINK_NOTIFY correctly in do_setlink (git-fixes).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bsc#1127378).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selinux: always allow mounting submounts (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_of: assume reg-shift of 2 for mrvl,mmp-uart (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: fsl_lpuart: fix maximum acceptable baud rate with over-sampling (bsc#1051510).\n- serial: imx: Update cached mctrl value when changing RTS (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc: fsl: qbman: avoid race in clearing QMan interrupt (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- spi: pxa2xx: Setup maximum supported DMA transfer length (bsc#1051510).\n- spi: ti-qspi: Fix mmap read when more than one CS in use (bsc#1051510).\n- spi/topcliff_pch: Fix potential NULL dereference on allocation error (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- supported.conf\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- svm: Fix improper check when deactivate AVIC (bsc#1130335).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- thermal: bcm2835: Fix crash in bcm2835_thermal_debugfs (bsc#1051510).\n- thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal/intel_powerclamp: fix truncated kthread name ().\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: Fix some name collisions with drivers/char/tpm.h (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm_tis_spi: Pass the SPI IRQ down to the driver (bsc#1051510).\n- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- uio: Reduce return paths from uio_write() (bsc#1051510).\n- Update config files. Remove conditional support for SMB2 and SMB3:\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).\n- usb: common: Consider only available nodes for dr_mode (bsc#1129770).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: core: only clean up what we allocated (bsc#1051510).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Fix the uninitialized link_state when udc starts (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: gadget: synchronize_irq dwc irq in suspend (bsc#1051510).\n- usb: gadget: f_hid: fix deadlock in f_hidg_write() (bsc#1129770).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: Potential NULL dereference on allocation error (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: phy: fix link errors (bsc#1051510).\n- usb: phy: twl6030-usb: fix possible use-after-free on remove (bsc#1051510).\n- usb: serial: cp210x: add ID for Ingenico 3070 (bsc#1129770).\n- usb: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485 (bsc#1129770).\n- usb: serial: mos7720: fix mos_parport refcount imbalance on error path (bsc#1129770).\n- usb: serial: option: add Telit ME910 ECM composition (bsc#1129770).\n- usb: serial: option: set driver_info for SIM5218 and compatibles (bsc#1129770).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmci: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/cpu: Add Atom Tremont (Jacobsville) ().\n- x86/CPU/AMD: Set the CPB bit unconditionally on F17h (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n- yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114279).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-1193", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1193-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:1193-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB/#KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:1193-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB/#KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113399", "url": "https://bugzilla.suse.com/1113399" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123105", "url": "https://bugzilla.suse.com/1123105" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125342", "url": "https://bugzilla.suse.com/1125342" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126356", "url": "https://bugzilla.suse.com/1126356" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126740", "url": "https://bugzilla.suse.com/1126740" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127378", "url": "https://bugzilla.suse.com/1127378" }, { "category": "self", "summary": "SUSE Bug 1127445", "url": "https://bugzilla.suse.com/1127445" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129276", "url": "https://bugzilla.suse.com/1129276" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1130130", "url": "https://bugzilla.suse.com/1130130" }, { "category": "self", "summary": "SUSE Bug 1130154", "url": "https://bugzilla.suse.com/1130154" }, { "category": "self", "summary": "SUSE Bug 1130335", "url": "https://bugzilla.suse.com/1130335" }, { "category": "self", "summary": "SUSE Bug 1130336", "url": "https://bugzilla.suse.com/1130336" }, { "category": "self", "summary": "SUSE Bug 1130337", "url": "https://bugzilla.suse.com/1130337" }, { "category": "self", "summary": "SUSE Bug 1130338", "url": "https://bugzilla.suse.com/1130338" }, { "category": "self", "summary": "SUSE Bug 1130425", "url": "https://bugzilla.suse.com/1130425" }, { "category": "self", "summary": "SUSE Bug 1130427", "url": "https://bugzilla.suse.com/1130427" }, { "category": "self", "summary": "SUSE Bug 1130518", "url": "https://bugzilla.suse.com/1130518" }, { "category": "self", "summary": "SUSE Bug 1131062", "url": "https://bugzilla.suse.com/1131062" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-04-12T06:18:34Z", "generator": { "date": "2019-04-12T06:18:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:1193-1", "initial_release_date": "2019-04-12T06:18:34Z", "revision_history": [ { "date": "2019-04-12T06:18:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-devel-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-docs-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-macros-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-source-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-source-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-debug-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-default-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-syms-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…