Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP3:Update
patchinfo.12358
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.12358
<patchinfo incident="12358"> <issue tracker="bnc" id="1140012">L3: kernel WARNING in nfs_clear_inode+0x56/0x90 after umount</issue> <issue tracker="bnc" id="1045640">qib/hfi1 memory leak running fi_msg_rma -o writedata</issue> <issue tracker="bnc" id="1140652">Update bcache fixes upto Linux v5.3</issue> <issue tracker="bnc" id="1144288">bcache: A deadlock/panic problem introduced from initial bcache commit since Linux v3.10</issue> <issue tracker="bnc" id="1130972">Update bcache fixes upto Linux v5.0</issue> <issue tracker="bnc" id="1144257">bcache data lost due to stack corruption</issue> <issue tracker="bnc" id="1144273">Kernel panic when setting writeback_percent to a non-attached backing device</issue> <issue tracker="bnc" id="1076033">weekly btrfs balance causes hang</issue> <issue tracker="bnc" id="1107256">DomU's becoming unresponsive sitting in xen_poll_irq_timeout</issue> <issue tracker="bnc" id="1141628">L3: i40e: using tcpdump results in hang connections</issue> <issue tracker="bnc" id="1142098">Kernel crashes in handle_pte_fault reading vm_area_struct->vm_flags</issue> <issue tracker="bnc" id="1140945">[SLES15 SP1] [Power8] data corruption while returning from watchpoint exception handler</issue> <issue tracker="bnc" id="1141401">SLES 15 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue tracker="bnc" id="1141402">SLES 11 SP4 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue tracker="bnc" id="1141452">SLES12 SP5 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue tracker="bnc" id="1141453">SLES 12 SP4 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue tracker="bnc" id="1141454">SLES 12 SP3 - [Power8] data corruption while returning from watchpoint exception handler</issue> <issue tracker="bnc" id="1144920">VUL-1: kernel-source: use-after-free reads in show_numa_stats()</issue> <issue tracker="bnc" id="1140903">L3: SLES 12 SP4 Azure based kvm VM crashed with Protection fault</issue> <issue tracker="bnc" id="1123161">VUL-1: CVE-2019-3819: kernel-source: kernel: infinite loop in drivers/hid/hid-debug.c:hid_debug_events_read()</issue> <issue tracker="bnc" id="1146163">VUL-1: CVE-2017-18551: kernel-source: out of bounds write in the function i2c_smbus_xfer_emulated</issue> <issue tracker="bnc" id="1145922">VUL-0: CVE-2019-15118: kernel-source: ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term</issue> <issue tracker="bnc" id="1145920">VUL-0: CVE-2019-15117: kernel-source: ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit</issue> <issue tracker="bnc" id="1142857">VUL-1: CVE-2019-10207: kernel-source: bluetooth: hci_uart: 0x0 address execution as nonprivileged user</issue> <issue tracker="bnc" id="1143045">VUL-1: CVE-2018-20855: kernel-source: memory leak at userspace due to no initialization of mlx5_ib_create_qp_resp</issue> <issue tracker="bnc" id="1143048">VUL-1: CVE-2018-20856: kernel-source: memory use-after-free issue in __blk_drain_queue()</issue> <issue tracker="bnc" id="1139358">VUL-0: CVE-2019-1125: kernel: SWAPGS speculative execution</issue> <issue tracker="bnc" id="1143191">VUL-1: CVE-2019-14283: kernel-source: set_geometry in drivers/block/floppy.c does not validate the sect and head fields</issue> <issue tracker="bnc" id="1143189">VUL-0: CVE-2019-14284: kernel-source: denial of service by setup_format_params division-by-zero</issue> <issue tracker="bnc" id="1134399">VUL-1: CVE-2019-11810: kernel-source: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c</issue> <issue tracker="bnc" id="1142023">VUL-0: CVE-2019-13631: kernel-source: kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c</issue> <issue id="2019-3819" tracker="cve" /> <issue id="2017-18551" tracker="cve" /> <issue id="2019-15118" tracker="cve" /> <issue id="2019-15117" tracker="cve" /> <issue id="2019-10207" tracker="cve" /> <issue id="2018-20855" tracker="cve" /> <issue id="2018-20856" tracker="cve" /> <issue id="2019-1125" tracker="cve" /> <issue id="2019-14283" tracker="cve" /> <issue id="2019-14284" tracker="cve" /> <issue id="2019-11810" tracker="cve" /> <issue id="2019-13631" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>osalvador</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") could have caused a system lock up and a denial of service (bnc#1123161). - CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922). - CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920). - CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189). - CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191). - CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023). - CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399). - CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358). - CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857). - CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048). - CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045). - CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163). The following non-security bugs were fixed: - bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288). - bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288). - bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257). - bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273). - bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288). - bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288). - btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256). - i40e: add functions to control default VSI (bsc#1141628). - i40e: set default VSI without a reset (bsc#1141628). - mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098). - nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012). - powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454). - qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640). - sched/fair: Do not free p->numa_faults with concurrent readers (bsc#1144920). - sched/fair: Use RCU accessors consistently for ->numa_group (bsc#1144920). - x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903). - xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor