Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP5:GA
patchinfo.4061
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4061
<patchinfo incident="4061"> <issue id="1003153" tracker="bnc">xfs: incorrect error codes to xfs_buf_ioerror</issue> <issue id="1003925" tracker="bnc">VUL-0: CVE-2015-8956: kernel: NULL dereference in RFCOMM bind callback</issue> <issue id="1004462" tracker="bnc">VUL-0: CVE-2016-8658: kernel: Stack buffer overflow in brcmf_cfg80211_start_ap</issue> <issue id="1004517" tracker="bnc">VUL-0: CVE-2016-7042: kernel: Stack corruption while reading /proc/keys</issue> <issue id="1005666" tracker="bnc">L3: BTRFS warning in btrfs_destroy_inode+0x29c/0x2d0 with 3.12.62-60.62-default</issue> <issue id="1007197" tracker="bnc">VUL-0: CVE-2016-9083, CVE-2016-9084: kernel: vfio driver integer overflow</issue> <issue id="1008833" tracker="bnc">VUL-0: CVE-2016-8633: kernel: Buffer overflow in firewire driver via crafted incoming packets</issue> <issue id="1008979" tracker="bnc">Zombie processes blocking kGraft migration</issue> <issue id="1009969" tracker="bnc">VUL-0: CVE-2016-8645: kernel: BUG() statement can be hit in net/ipv4/tcp_input.c</issue> <issue id="1010040" tracker="bnc">kernel-obs-qa-xen not needed anymore</issue> <issue id="1010475" tracker="bnc">VUL-0: CVE-2016-7914: kernel: Incomplete check in assoc_array_insert_into_terminal_node allowing for DoS or memory disclosure</issue> <issue id="1010478" tracker="bnc">VUL-0: CVE-2016-7913: kernel: Local privilege escalation via the xc2028_set_config function in the xc2028 tuner driver</issue> <issue id="1010501" tracker="bnc">VUL-0: CVE-2015-8962: kernel: Double free in the sg_common_write function in drivers/scsi/sg.cin allowing physically close users to escalate privileges</issue> <issue id="1010502" tracker="bnc">VUL-0: CVE-2015-8963: kernel: Race condition in kernel/events/core.c allows local privilege escalation on CPU unplug</issue> <issue id="1010507" tracker="bnc">VUL-0: CVE-2015-8964: kernel: tty_set_termios_ldisc function leaks data when misused</issue> <issue id="1010612" tracker="bnc">iscsi calls inet_accept which prevents kGraft to finish patching</issue> <issue id="1010711" tracker="bnc">VUL-0: CVE-2016-7911: kernel-source: Race condition in the get_task_ioprio function in block/ioprio.c in the Linuxkernel before 4.6.6 al...</issue> <issue id="1010716" tracker="bnc">VUL-0: CVE-2016-7910: kernel-source: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c inthe Linux kernel bef...</issue> <issue id="1011820" tracker="bnc">VUL-0: CVE-2016-8650: kernel: Null pointer dereference via keyctl</issue> <issue id="1012422" tracker="bnc">Better compiler warning check</issue> <issue id="1013038" tracker="bnc">VUL-0: CVE-2016-9756: kernel-source: kvm: stack memory information leakage</issue> <issue id="1013531" tracker="bnc">VUL-0: CVE-2016-9793: kernel-source: signed overflows for SO_{SND|RCV}BUFFORCE</issue> <issue id="1013540" tracker="bnc">VUL-0: CVE-2016-9806: kernel-source: double free in netlink_dump</issue> <issue id="1013542" tracker="bnc">VUL-0: CVE-2012-6704: kernel-source: signed overflows for SO_{SND|RCV}BUF</issue> <issue id="1014746" tracker="bnc">VUL-0: CVE-2016-8399: kernel-source: stack out-of-bounds read in memcpy_fromiovec</issue> <issue id="1016482" tracker="bnc">Kernel panic on Broadwell CPUs when session audit logging is enabled</issue> <issue id="1017410" tracker="bnc">live patching not applied on SP2 in XEN</issue> <issue id="1017589" tracker="bnc">VUL-0: CVE-2016-9806: kernel-source: double free in netlink_dump</issue> <issue id="1017710" tracker="bnc">VUL-0: CVE-2016-10088: kernel: sg: write operations not properly restricted when KERNEL_DS option is set (incomplete fix for CVE-2016-9576)</issue> <issue id="1019300" tracker="bnc">Reproducible SLES12-SP1 XFS inodes corruption</issue> <issue id="1019851" tracker="bnc">VUL-0: CVE-2017-2584: kernel-source: kvm: use after free in complete_emulated_mmio</issue> <issue id="1020602" tracker="bnc">VUL-0: CVE-2017-2583: kernel-source: broken emulation of "MOV SS, null selector"</issue> <issue id="1021258" tracker="bnc">VUL-1: CVE-2017-5551: kernel-source: tmpfs:clear S_ISGID when setting posix ACLs</issue> <issue id="320805" tracker="fate">Enable ext2 and XIP support for ext2</issue> <issue id="881008" tracker="bnc">Xen hotplug scripts are not called to re-connect vif when doing a disable/enable in the vm</issue> <issue id="915183" tracker="bnc">SLES 12 - many xfs warnings at ../fs/xfs/xfs_aops.c:1188</issue> <issue id="958606" tracker="bnc">Irritating kernel message: Couldn't get size: 0x800000000000000e during booting KVM guests</issue> <issue id="961257" tracker="bnc">ipv6: add complete rcu protection around np->opt?</issue> <issue id="970083" tracker="bnc">L3: netfilter LOG rule handling in net_ns broken in SLES 12</issue> <issue id="971989" tracker="bnc">Paths not failed properly when manually disabling multiple virtual FC ports</issue> <issue id="976195" tracker="bnc">kernel not compiled with execute in place (XIP) for filesystems</issue> <issue id="978094" tracker="bnc">virsh/xl domu shutdown hangs domain name changes to null</issue> <issue id="980371" tracker="bnc">VUL-0: CVE-2016-4805: kernel: Use after free vulnerability in ppp_unregister_channel</issue> <issue id="980560" tracker="bnc">dmsetup can't properly force remove LVM with mounted XFS</issue> <issue id="981038" tracker="bnc">dbench4.0 async/fsync report huge decline in higher processes on HP Gen8 (BtrFS)</issue> <issue id="981597" tracker="bnc">zypper in -t patterns fails due to filesystem problems (races? loss of files?)</issue> <issue id="981709" tracker="bnc">L3: Btrfs shows scrub reports uncorrectable errors on root file system.</issue> <issue id="982282" tracker="bnc">SLES 12 SP1 - SCSI: Increase REPORT_LUNS timeout</issue> <issue id="982544" tracker="bnc">bridge forwarding of IPv6 fragments broken if nf_defrag_ipv6 is loaded</issue> <issue id="983619" tracker="bnc">btrfs: possible to leave partially committed operations on disk after transaction abort</issue> <issue id="983721" tracker="bnc">Not all memory is reclaimed after process termination with THP enabled</issue> <issue id="983977" tracker="bnc">[rmmod] rmmod of saa7146 in D state infinitely</issue> <issue id="984148" tracker="bnc">xfs online resize does not increase possible inodes much without remount</issue> <issue id="984419" tracker="bnc">ftrace kernel crash caused by binutils generating short 2-byte jmp instruction</issue> <issue id="984755" tracker="bnc">VUL-0: CVE-2016-4470: kernel-source: Uninitialized variable in request_key handling causes kernel crash in error handling path</issue> <issue id="985978" tracker="bnc">Clear AER error status during enumeration and resume</issue> <issue id="986362" tracker="bnc">VUL-0: CVE-2016-4997: kernel: Linux local privilege escalation in compat_setsockopt</issue> <issue id="986365" tracker="bnc">VUL-0: CVE-2016-4998: kernel: OOB read / Denial of Service in setsockopt()</issue> <issue id="986445" tracker="bnc">system crashes while performing docker operations (image imports, container startups)</issue> <issue id="986569" tracker="bnc">VUL-0: CVE-2016-5828: kernel-source: powerpc/tm: Always reclaim in start_thread() for exec() class syscalls - Linux kernel</issue> <issue id="986572" tracker="bnc">VUL-0: CVE-2016-5829: kernel-source: HID: hiddev buffer overflows</issue> <issue id="986811" tracker="bnc">VUL-0: CVE-2014-9904: kernel-source: The snd_compress_check_input function in sound/core/compress_offload.cin the ALSA subsystem in the ...</issue> <issue id="986941" tracker="bnc">VUL-0: CVE-2012-6703: kernel-source: alsa: integer overflow in ALSA snd_compress_check_input</issue> <issue id="987542" tracker="bnc">VUL-0: CVE-2016-6130: kernel-source: sclp_ctl_ioctl_sccb local user information leak</issue> <issue id="987565" tracker="bnc">Possible memory leak since upgrade from 3.0.101-68-default to 3.0.101-7{1,7}-default</issue> <issue id="987576" tracker="bnc">REISERFS error : vs-4080 _reiserfs_free_block - FS goes readonly</issue> <issue id="989152" tracker="bnc">VUL-1: CVE-2016-5696: kernel-source: challenge ACK counter information disclosure</issue> <issue id="990384" tracker="bnc">BTRFS turns RO in openQA tests</issue> <issue id="991608" tracker="bnc">VUL-0: CVE-2016-6480: kernel: double read leading to kernel information discosure</issue> <issue id="991665" tracker="bnc">VUL-0: kernel: hid: forged keyboard can panic kernel</issue> <issue id="993392" tracker="bnc">Kernel panic - not syncing: Fatal exception in interrupt</issue> <issue id="993890" tracker="bnc">VUL-1: kernel: kaweth driver can be made to oops by malicious device</issue> <issue id="993891" tracker="bnc">VUL-1: kernel: cdc-acm can be made to oops by malicious device</issue> <issue id="994296" tracker="bnc">VUL-0: CVE-2016-6828: kernel-source: tcp_xmit_retransmit_queue use after free on 4.8-rc1 / master</issue> <issue id="994748" tracker="bnc">VUL-0: CVE-2016-6327: kernel-source: infiniband: Kernel crash by sending ABORT_TASK command</issue> <issue id="994881" tracker="bnc">btrfs: possible to leak or alias orphaned roots if they were in the tree log</issue> <issue id="995968" tracker="bnc">VUL-1: CVE-2016-7097: kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit</issue> <issue id="997708" tracker="bnc">mpt?sas::panic on AER</issue> <issue id="998795" tracker="bnc">squashfs: errors returned via dir_emit will be missed</issue> <issue id="999584" tracker="bnc">SLES11 SP4: NFS write activities unstable/broken with latest Kernels</issue> <issue id="999600" tracker="bnc">btrfs BUG: unable to handle kernel NULL pointer dereference at (null)</issue> <issue id="999932" tracker="bnc">VUL-0: CVE-2016-7425: kernel-source: SCSI arcmsr driver: Buffer overflow in arcmsr_iop_message_xfer()</issue> <issue id="999943" tracker="bnc">mpt?sas::panic on AER</issue> <issue id="2017-5551" tracker="cve" /> <issue id="2016-7097" tracker="cve" /> <issue id="2017-2583" tracker="cve" /> <issue id="2017-2584" tracker="cve" /> <issue id="2016-10088" tracker="cve" /> <issue id="2016-8645" tracker="cve" /> <issue id="2016-8399" tracker="cve" /> <issue id="2016-9806" tracker="cve" /> <issue id="2016-9756" tracker="cve" /> <issue id="2016-9793" tracker="cve" /> <issue id="2016-7910" tracker="cve" /> <issue id="2015-8962" tracker="cve" /> <issue id="2016-7913" tracker="cve" /> <issue id="2016-7911" tracker="cve" /> <issue id="2015-8964" tracker="cve" /> <issue id="2015-8963" tracker="cve" /> <issue id="2016-7914" tracker="cve" /> <issue id="2016-8633" tracker="cve" /> <issue id="2016-9083" tracker="cve" /> <issue id="2016-9084" tracker="cve" /> <issue id="2016-7042" tracker="cve" /> <issue id="2015-8956" tracker="cve" /> <issue id="2016-8658" tracker="cve" /> <issue id="2016-7425" tracker="cve" /> <issue id="2016-6327" tracker="cve" /> <issue id="2016-6828" tracker="cve" /> <issue id="2016-5696" tracker="cve" /> <issue id="2016-6130" tracker="cve" /> <issue id="2016-6480" tracker="cve" /> <issue id="2016-4998" tracker="cve" /> <issue id="2016-5828" tracker="cve" /> <issue id="2014-9904" tracker="cve" /> <issue id="2016-5829" tracker="cve" /> <issue id="2016-4470" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alnovak</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes. The following feature was implemented: - The ext2 filesystem got reenabled and supported to allow support for "XIP" (Execute In Place) (FATE#320805). The following security bugs were fixed: - CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258). - CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968). - CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602). - CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851). - CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710). - CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969). - CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746). - CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540). - CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038). - CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531). - CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716). - CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501). - CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478). - CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711). - CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507). - CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502). - CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475). - CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833). - CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug (bnc#1007197). - CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197). - CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517). - CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925). - CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462). - CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932). - CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748). - CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296). - CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152). - CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability (bnc#987542). - CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability (bnc#991608). - CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365). - CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569). - CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811). - CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572). - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755). The following non-security bugs were fixed: - base: make module_create_drivers_dir race-free (bnc#983977). - btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597). - btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619). - btrfs: be more precise on errors when getting an inode from disk (bsc#981038). - btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881). - btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600). - btrfs: fix relocation incorrectly dropping data references (bsc#990384). - btrfs: handle quota reserve failure properly (bsc#1005666). - btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038). - btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709). - btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709). - cdc-acm: added sanity checking for probe() (bsc#993891). - ext2: Enable ext2 driver in config files (bsc#976195, fate#320805) - ext4: Add parameter for tuning handling of ext2 (bsc#976195). - ext4: Fixup handling for custom configs in tuning. - ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419). - ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257) - ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt. - kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544). - kabi: reintroduce sk_filter (kabi). - kaweth: fix firmware download (bsc#993890). - kaweth: fix oops upon failed memory allocation (bsc#993890). - kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296). - kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296). - kgr: ignore zombie tasks during the patching (bnc#1008979). - mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721). - mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445). - modsign: Print appropriate status message when accessing UEFI variable (bsc#958606). - mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820). - mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943). - netfilter: allow logging fron non-init netns (bsc#970083). - netfilter: bridge: do not leak skb in error paths (bsc#982544). - netfilter: bridge: forward IPv6 fragmented packets (bsc#982544). - netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544). - nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584). - nfs: Fix a regression in the read() syscall (bsc#999584). - pci/aer: Clear error status registers during enumeration and restore (bsc#985978). - ppp: defer netns reference release for ppp channel (bsc#980371). - reiserfs: fix race in prealloc discard (bsc#987576). - scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989) - scsi: Increase REPORT_LUNS timeout (bsc#982282). - series.conf: move stray netfilter patches to the right section - squashfs3: properly handle dir_emit() failures (bsc#998795). - supported.conf: Add ext2 - timers: Use proper base migration in add_timer_on() (bnc#993392). - tty: audit: Fix audit source (bsc#1016482). - tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507). - usb: fix typo in wMaxPacketSize validation (bsc#991665). - usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665). - xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094) - xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560). - xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153). - xfs: fix premature enospc on inode allocation (bsc#984148). - xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148). - xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148). - xfs: refactor xlog_recover_process_data() (bsc#1019300). - xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565). - xhci: silence warnings in switch (bnc#991665). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor