File _patchinfo of Package patchinfo.16405

<patchinfo incident="16405">
  <issue id="1058115" tracker="bnc">ORC tracker</issue>
  <issue id="1071995" tracker="bnc">[TRACKERBUG] SLE15 livepatch backports</issue>
  <issue id="1144333" tracker="bnc">[TRACKERBUG] cifs.ko recent fixes backport</issue>
  <issue id="1154366" tracker="bnc">Memory hot-plug crashing SLES15 SP1 running kernel-default-4.12.14-197.18.1</issue>
  <issue id="1165629" tracker="bnc">VUL-0: CVE-2020-1749: kernel-source: some ipv6 protocols not encrypted over ipsec tunnel.</issue>
  <issue id="1171988" tracker="bnc">VUL-0: CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjac</issue>
  <issue id="1172428" tracker="bnc">L3: System crash in cifs_reconnect()-&gt;reconn_inval_dfs_target()-&gt;dfs_cache_get_tgt_name()</issue>
  <issue id="1172963" tracker="bnc">OCFS2 crashes :invalid inode passed on _raw_spin_lock / (other crash) BUG_ON(!buffer_uptodate(bh))     ref:_00D1igLOd._5001iP7mAv:ref</issue>
  <issue id="1173798" tracker="bnc">VUL-1: CVE-2020-14314: kernel-source: buffer uses out of index in ext3/4 filesystem</issue>
  <issue id="1173954" tracker="bnc">OCFS2 remounting needed after setfacl command</issue>
  <issue id="1174205" tracker="bnc">VUL-0: CVE-2020-14331: kernel-source: buffer over write in vgacon_scroll</issue>
  <issue id="1174689" tracker="bnc">SLES 15 SP2 - EEH on qla2xxx while triggering kdump with root on FC disks (using qla2xxx/Marvell/QLogic/kdump/ZZ Gen4)</issue>
  <issue id="1174699" tracker="bnc">SLES12-SP5 multicast message stuck in kernel buffer</issue>
  <issue id="1174757" tracker="bnc">VUL-0: CVE-2020-16166: kernel-source: remote attackers may be able to make observations which may reveal  the internal state of the network RNG</issue>
  <issue id="1174784" tracker="bnc">L3: PANIC: "kernel BUG at ../fs/btrfs/relocation.c:2609!  Need core analyzed</issue>
  <issue id="1174978" tracker="bnc">L3: All paths fail with handler scsi_dh_alua error 8</issue>
  <issue id="1175112" tracker="bnc">SLES 15 SP1 -  ibmvnic: Fix IRQ mapping disposal in error path</issue>
  <issue id="1175127" tracker="bnc">Only Notify Hyper-V For Die Events That Are Oops</issue>
  <issue id="1175213" tracker="bnc">VUL-1: CVE-2020-14356: kernel-source: Use After Free vulnerability in cgroup BPF component</issue>
  <issue id="1175228" tracker="bnc">Backport of 5500ab4ed3b8 "ocfs2: fix the application IO timeout when fstrim is running" patch [SLES 12 SP5]</issue>
  <issue id="1175515" tracker="bnc">L3: TIPC: Backport of upstream fix for kernel crash ref:_00D1igLOd._5001iSBrZP:ref</issue>
  <issue id="1175518" tracker="bnc">VUL-0: CVE-2020-24394: kernel-source: umask not applied on filesystem without ACL support</issue>
  <issue id="1175691" tracker="bnc">HPE requests porting fix for BZ 1164910 --&gt; SLES 12SP4/SP5 &amp; SLES 15 SP1/SP2</issue>
  <issue id="1175749" tracker="bnc">L3: Sles15sp2 xen VM crashed with oops Need core analyzed</issue>
  <issue id="1176069" tracker="bnc">VUL-0: CVE-2020-14386: kernel-source: local privilege escalation via memory corruption in net/packet/af_packet.c</issue>
  <issue id="2020-14386" tracker="cve" />
  <issue id="2020-1749" tracker="cve" />
  <issue id="2020-14314" tracker="cve" />
  <issue id="2020-14356" tracker="cve" />
  <issue id="2020-14331" tracker="cve" />
  <issue id="2020-16166" tracker="cve" />
  <issue id="2020-10135" tracker="cve" />
  <issue id="2020-24394" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>ematsumiya</packager>
  <reboot_needed/>
  <description>The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bugs were fixed:

- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- Revert "ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963)." This reverts commit 2638f62c6bc33d4c10ce0dddbf240aa80d366d7b.
- Revert "ocfs2: load global_inode_alloc (bsc#1172963)." This reverts commit f04f670651f505cb354f26601ec5f5e4428f2f47.
- scsi: scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1174978). 
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- Update patch reference for a tipc fix patch (bsc#1175515)
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen: do not reschedule in preemption off sections (bsc#1175749).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by