File _patchinfo of Package patchinfo.12326

<patchinfo incident="12326">
  <issue id="1130972" tracker="bnc">Update bcache fixes upto Linux v5.0</issue>
  <issue id="1134399" tracker="bnc">VUL-1: CVE-2019-11810: kernel-source:  A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c</issue>
  <issue id="1138744" tracker="bnc">VM interfaces stall on XEN Dom0 hec01p00413. VM's not responding to ARP requests</issue>
  <issue id="1139358" tracker="bnc">VUL-0: CVE-2019-1125: kernel: SWAPGS speculative execution</issue>
  <issue id="1140652" tracker="bnc">Update bcache fixes upto Linux v5.3</issue>
  <issue id="1140945" tracker="bnc">[SLES15 SP1] [Power8] data corruption while returning from watchpoint exception handler</issue>
  <issue id="1141401" tracker="bnc">SLES 15 - [Power8] data corruption while returning from watchpoint exception handler</issue>
  <issue id="1141402" tracker="bnc">SLES 11 SP4 - [Power8] data corruption while returning from watchpoint exception handler</issue>
  <issue id="1141452" tracker="bnc">SLES12 SP5 - [Power8] data corruption while returning from watchpoint exception handler</issue>
  <issue id="1141453" tracker="bnc">SLES 12 SP4 - [Power8] data corruption while returning from watchpoint exception handler</issue>
  <issue id="1141454" tracker="bnc">SLES 12 SP3 - [Power8] data corruption while returning from watchpoint exception handler</issue>
  <issue id="1142023" tracker="bnc">VUL-0: CVE-2019-13631: kernel-source: kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c</issue>
  <issue id="1142098" tracker="bnc">Kernel crashes in handle_pte_fault reading  vm_area_struct-&gt;vm_flags</issue>
  <issue id="1142254" tracker="bnc">VUL-1: CVE-2019-13648: kernel-source:  powerpc with hardware transactional memory disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigr</issue>
  <issue id="1143045" tracker="bnc">VUL-1: CVE-2018-20855: kernel-source: memory leak at userspace due to no initialization of mlx5_ib_create_qp_resp</issue>
  <issue id="1143189" tracker="bnc">VUL-0: CVE-2019-14284: kernel-source: denial of service by setup_format_params division-by-zero</issue>
  <issue id="1143191" tracker="bnc">VUL-1: CVE-2019-14283: kernel-source: set_geometry in drivers/block/floppy.c does not validate the sect and head fields</issue>
  <issue id="1144257" tracker="bnc">bcache data lost due to stack corruption</issue>
  <issue id="1144273" tracker="bnc">Kernel panic when setting writeback_percent to a non-attached backing device</issue>
  <issue id="1144288" tracker="bnc">bcache: A deadlock/panic problem introduced from initial bcache commit since Linux v3.10</issue>
  <issue id="2019-1125" tracker="cve" />
  <issue id="2018-20855" tracker="cve" />
  <issue id="2019-14283" tracker="cve" />
  <issue id="2019-14284" tracker="cve" />
  <issue id="2019-11810" tracker="cve" />
  <issue id="2019-13648" tracker="cve" />
  <issue id="2019-13631" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>alnovak</packager>
  <reboot_needed/>
  <description>The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).

The following non-security bugs were fixed:

- bcache: Revert "bcache: fix high CPU occupancy during journal" (bsc#1140652, bsc#1144288).
- bcache: Revert "bcache: free heap cache_set->flush_btree in bch_journal_free" (bsc#1140652, bsc#1144288).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
- xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by