Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:Update
patchinfo.12326
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.12326
<patchinfo incident="12326"> <issue id="1130972" tracker="bnc">Update bcache fixes upto Linux v5.0</issue> <issue id="1134399" tracker="bnc">VUL-1: CVE-2019-11810: kernel-source: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c</issue> <issue id="1138744" tracker="bnc">VM interfaces stall on XEN Dom0 hec01p00413. VM's not responding to ARP requests</issue> <issue id="1139358" tracker="bnc">VUL-0: CVE-2019-1125: kernel: SWAPGS speculative execution</issue> <issue id="1140652" tracker="bnc">Update bcache fixes upto Linux v5.3</issue> <issue id="1140945" tracker="bnc">[SLES15 SP1] [Power8] data corruption while returning from watchpoint exception handler</issue> <issue id="1141401" tracker="bnc">SLES 15 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue id="1141402" tracker="bnc">SLES 11 SP4 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue id="1141452" tracker="bnc">SLES12 SP5 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue id="1141453" tracker="bnc">SLES 12 SP4 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue id="1141454" tracker="bnc">SLES 12 SP3 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue id="1142023" tracker="bnc">VUL-0: CVE-2019-13631: kernel-source: kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c</issue> <issue id="1142098" tracker="bnc">Kernel crashes in handle_pte_fault reading vm_area_struct->vm_flags</issue> <issue id="1142254" tracker="bnc">VUL-1: CVE-2019-13648: kernel-source: powerpc with hardware transactional memory disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigr</issue> <issue id="1143045" tracker="bnc">VUL-1: CVE-2018-20855: kernel-source: memory leak at userspace due to no initialization of mlx5_ib_create_qp_resp</issue> <issue id="1143189" tracker="bnc">VUL-0: CVE-2019-14284: kernel-source: denial of service by setup_format_params division-by-zero</issue> <issue id="1143191" tracker="bnc">VUL-1: CVE-2019-14283: kernel-source: set_geometry in drivers/block/floppy.c does not validate the sect and head fields</issue> <issue id="1144257" tracker="bnc">bcache data lost due to stack corruption</issue> <issue id="1144273" tracker="bnc">Kernel panic when setting writeback_percent to a non-attached backing device</issue> <issue id="1144288" tracker="bnc">bcache: A deadlock/panic problem introduced from initial bcache commit since Linux v3.10</issue> <issue id="2019-1125" tracker="cve" /> <issue id="2018-20855" tracker="cve" /> <issue id="2019-14283" tracker="cve" /> <issue id="2019-14284" tracker="cve" /> <issue id="2019-11810" tracker="cve" /> <issue id="2019-13648" tracker="cve" /> <issue id="2019-13631" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alnovak</packager> <reboot_needed/> <description>The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358). - CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045). - CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189). - CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191). - CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399). - CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254). - CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023). The following non-security bugs were fixed: - bcache: Revert "bcache: fix high CPU occupancy during journal" (bsc#1140652, bsc#1144288). - bcache: Revert "bcache: free heap cache_set->flush_btree in bch_journal_free" (bsc#1140652, bsc#1144288). - bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288). - bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288). - bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257). - bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273). - bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288). - bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288). - mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098). - powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454). - xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor