OPENSUSE-SU-2019:2444-1
Vulnerability from csaf_opensuse - Published: 2019-11-05 17:28 - Updated: 2019-11-05 17:28Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch:
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-16995: A memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c. if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).
- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).
- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).
- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).
- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).
- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).
- Add kernel module compression support (bsc#1135854)
- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).
- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).
- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).
- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).
- ALSA: usb-audio: fix PCM device order (bsc#1051510).
- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).
- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).
- ALSA: usb-audio: remove some dead code (bsc#1051510).
- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).
- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).
- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).
- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- Blacklist 'signal: Correct namespace fixups of si_pid and si_uid' (bsc#1142667)
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: af_alg - consolidation of duplicate code (bsc#1154737).
- crypto: af_alg - fix race accessing cipher request (bsc#1154737).
- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg - remove locking in async callback (bsc#1154737).
- crypto: af_alg - update correct dst SGL entry (bsc#1051510).
- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead - overhaul memory management (bsc#1154737).
- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).
- crypto: algif - return error code when no data was processed (bsc#1154737).
- crypto: algif_skcipher - overhaul memory management (bsc#1154737).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: do not dma memory off of the stack (bsc#1152790).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- dasd_fba: Display '00000000' for zero page when dumping sense
- /dev/mem: Bail out upon SIGKILL (git-fixes).
- drm: add __user attribute to ptr_to_compat() (bsc#1111666).
- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).
- drm/amd/display: reprogram VM config when system resume (bsc#1111666).
- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)
- drm/amd/display: support spdif (bsc#1111666).
- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).
- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).
- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/atomic_helper: Allow DPMS On<->Off changes for unregistered connectors (bsc#1111666).
- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).
- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).
- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).
- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)
- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).
- drm/mediatek: set DMA max segment size (bsc#1111666).
- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).
- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)
- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).
- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).
- drm/panel: check failure cases in the probe func (bsc#1111666).
- drm/panel: make drm_panel.h self-contained (bsc#1111666).
- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).
- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).
- drm/stm: attach gem fence to atomic state (bsc#1111666).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).
- efi: cper: print AER info of PCIe fatal error (bsc#1051510).
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- Fix AMD IOMMU kABI (bsc#1154610).
- Fix KVM kABI after x86 mmu backports (bsc#1117665).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: fix error message in hid_open_report() (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).
- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_connector.registered type changes (bsc#1111666).
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).
- lpfc: Add additional discovery log messages (bsc#1154521).
- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).
- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).
- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).
- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).
- lpfc: fix coverity error of dereference after null check (bsc#1154521).
- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).
- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).
- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).
- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).
- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).
- lpfc: Make FW logging dynamically configurable (bsc#1154521).
- lpfc: Remove lock contention target write path (bsc#1154521).
- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).
- lpfc: Slight fast-path Performance optimizations (bsc#1154521).
- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix null pointer dereference (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- packaging: add support for riscv64
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).
- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- powerplay: Respect units on max dcfclk watermark (bsc#1111666).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).
- r8152: Set macpassthru in reset_resume callback (bsc#1051510).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- rds: Fix warning (bsc#1154848).
- Revert 'drm/amd/display: Fix underscan not using proper scaling' (bsc#1111666).
- Revert 'drm/amd/powerplay: Enable/Disable NBPSTATE on On/OFF of UVD' (bsc#1111666).
- Revert 'drm/radeon: Fix EEH during kexec' (bsc#1051510).
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).
- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).
- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).
- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).
- scsi: lpfc: Check queue pointer before use (bsc#1154242).
- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).
- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).
- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).
- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).
- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).
- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).
- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).
- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).
- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).
- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).
- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).
- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).
- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).
- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).
- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).
- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).
- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).
- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).
- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).
- scsi: lpfc: Update async event logging (bsc#1154521).
- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- Sign non-x86 kernels when possible (boo#1134303)
- skge: fix checksum byte order (networking-stable-19_09_30).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: ldusb: fix memleak on disconnect (bsc#1051510).
- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- usb: ldusb: fix read info leaks (bsc#1051510).
- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix memleak on disconnect (bsc#1051510).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usblp: fix use-after-free on disconnect (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).
- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames: openSUSE-2019-2444
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-16995: A memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c. if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).\n- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).\n- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).\n- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).\n- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).\n- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).\n- Add kernel module compression support (bsc#1135854)\n- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- ALSA: usb-audio: fix PCM device order (bsc#1051510).\n- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).\n- ALSA: usb-audio: remove some dead code (bsc#1051510).\n- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).\n- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- Blacklist \u0027signal: Correct namespace fixups of si_pid and si_uid\u0027 (bsc#1142667)\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On\u003c-\u003eOff changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- Revert \u0027drm/amd/display: Fix underscan not using proper scaling\u0027 (bsc#1111666).\n- Revert \u0027drm/amd/powerplay: Enable/Disable NBPSTATE on On/OFF of UVD\u0027 (bsc#1111666).\n- Revert \u0027drm/radeon: Fix EEH during kexec\u0027 (bsc#1051510).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- Sign non-x86 kernels when possible (boo#1134303)\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2444",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2444-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2444-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2444-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1137861",
"url": "https://bugzilla.suse.com/1137861"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1141600",
"url": "https://bugzilla.suse.com/1141600"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1149853",
"url": "https://bugzilla.suse.com/1149853"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1151807",
"url": "https://bugzilla.suse.com/1151807"
},
{
"category": "self",
"summary": "SUSE Bug 1152033",
"url": "https://bugzilla.suse.com/1152033"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152790",
"url": "https://bugzilla.suse.com/1152790"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153607",
"url": "https://bugzilla.suse.com/1153607"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154242",
"url": "https://bugzilla.suse.com/1154242"
},
{
"category": "self",
"summary": "SUSE Bug 1154268",
"url": "https://bugzilla.suse.com/1154268"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154521",
"url": "https://bugzilla.suse.com/1154521"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154747",
"url": "https://bugzilla.suse.com/1154747"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-05T17:28:40Z",
"generator": {
"date": "2019-11-05T17:28:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2444-1",
"initial_release_date": "2019-11-05T17:28:40Z",
"revision_history": [
{
"date": "2019-11-05T17:28:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-lp151.28.25.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-lp151.28.25.1.noarch",
"product_id": "kernel-devel-4.12.14-lp151.28.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-lp151.28.25.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-lp151.28.25.1.noarch",
"product_id": "kernel-docs-4.12.14-lp151.28.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"product_id": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-lp151.28.25.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-lp151.28.25.1.noarch",
"product_id": "kernel-macros-4.12.14-lp151.28.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-lp151.28.25.1.noarch",
"product": {
"name": "kernel-source-4.12.14-lp151.28.25.1.noarch",
"product_id": "kernel-source-4.12.14-lp151.28.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-debug-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-default-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-syms-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-lp151.28.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-lp151.28.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch"
},
"product_reference": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-lp151.28.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch"
},
"product_reference": "kernel-source-4.12.14-lp151.28.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch"
},
"product_reference": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T17:28:40Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T17:28:40Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T17:28:40Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T17:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T17:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T17:28:40Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T17:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…