{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-extra":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-extra":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP4","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-extra":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP4","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-95.29.1","dlm-kmp-default":"4.12.14-95.29.1","gfs2-kmp-default":"4.12.14-95.29.1","ocfs2-kmp-default":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_12_14-95_29-default":"1-6.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP4","name":"kgraft-patch-SLE12-SP4_Update_7","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-6.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"4.12.14-95.29.1","kernel-obs-build":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP4","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"4.12.14-95.29.1","kernel-obs-build":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP4","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-base":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-man":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-base":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-man":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-base":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-man":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-base":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-man":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-base":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-man":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.29.1","kernel-default-base":"4.12.14-95.29.1","kernel-default-devel":"4.12.14-95.29.1","kernel-default-man":"4.12.14-95.29.1","kernel-devel":"4.12.14-95.29.1","kernel-macros":"4.12.14-95.29.1","kernel-source":"4.12.14-95.29.1","kernel-syms":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-extra":"4.12.14-95.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.29.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through  SWAPGS (bsc#1139358).\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n\n\nThe following non-security bugs were fixed:\n- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189)  A dedicated CVE was already assigned\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- asoc : cs4265 : readable register too low (bsc#1051510).\n- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).\n- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).\n- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).\n- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- hid: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: fix Guest installation fails by 'Invalid value '0-31' for 'cpuset.cpus': Invalid argument' (bsc#1143507)\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).\n- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).\n- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).\n- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).\n- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n\n","id":"SUSE-SU-2019:2072-1","modified":"2019-08-06T22:52:10Z","published":"2019-08-06T22:52:10Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20192072-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1051510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1055117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1071995"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1102247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1111666"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1123080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1130972"},{"type":"REPORT","url":"https://bugzilla.suse.com/1133021"},{"type":"REPORT","url":"https://bugzilla.suse.com/1134097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1134390"},{"type":"REPORT","url":"https://bugzilla.suse.com/1134399"},{"type":"REPORT","url":"https://bugzilla.suse.com/1135335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1135642"},{"type":"REPORT","url":"https://bugzilla.suse.com/1136896"},{"type":"REPORT","url":"https://bugzilla.suse.com/1137458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1137534"},{"type":"REPORT","url":"https://bugzilla.suse.com/1137535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1137584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1137609"},{"type":"REPORT","url":"https://bugzilla.suse.com/1137811"},{"type":"REPORT","url":"https://bugzilla.suse.com/1137827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1139358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140133"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140139"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140322"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140652"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140945"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140955"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140956"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140971"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140972"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141401"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142023"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142351"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142359"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142450"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1142868"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143003"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-20855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-1125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11810"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13631"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14284"}],"related":["CVE-2018-20855","CVE-2019-1125","CVE-2019-11810","CVE-2019-13631","CVE-2019-13648","CVE-2019-14283","CVE-2019-14284"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2018-20855","CVE-2019-1125","CVE-2019-11810","CVE-2019-13631","CVE-2019-13648","CVE-2019-14283","CVE-2019-14284"]}