openSUSE Security Announce
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
February 2018
- 1 participants
- 50 discussions
[security-announce] SUSE-SU-2018:0443-1: important: Security update for libreoffice
by opensuse-security@opensuse.org 14 Feb '18
by opensuse-security@opensuse.org 14 Feb '18
14 Feb '18
SUSE Security Update: Security update for libreoffice
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0443-1
Rating: important
References: #1080249
Cross-References: CVE-2018-6871
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libreoffice fixes the following issues:
LibreOffice was updated to 5.4.5.1:
- CVE-2018-6871: Fixes data exposure when using WEBSERVICE (bsc#1080249)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP3:
zypper in -t patch SUSE-SLE-WE-12-SP3-2018-305=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-305=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-305=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP3 (noarch):
libreoffice-icon-theme-galaxy-5.4.5.1-43.19.1
libreoffice-icon-theme-tango-5.4.5.1-43.19.1
libreoffice-l10n-af-5.4.5.1-43.19.1
libreoffice-l10n-ar-5.4.5.1-43.19.1
libreoffice-l10n-bg-5.4.5.1-43.19.1
libreoffice-l10n-ca-5.4.5.1-43.19.1
libreoffice-l10n-cs-5.4.5.1-43.19.1
libreoffice-l10n-da-5.4.5.1-43.19.1
libreoffice-l10n-de-5.4.5.1-43.19.1
libreoffice-l10n-en-5.4.5.1-43.19.1
libreoffice-l10n-es-5.4.5.1-43.19.1
libreoffice-l10n-fi-5.4.5.1-43.19.1
libreoffice-l10n-fr-5.4.5.1-43.19.1
libreoffice-l10n-gu-5.4.5.1-43.19.1
libreoffice-l10n-hi-5.4.5.1-43.19.1
libreoffice-l10n-hr-5.4.5.1-43.19.1
libreoffice-l10n-hu-5.4.5.1-43.19.1
libreoffice-l10n-it-5.4.5.1-43.19.1
libreoffice-l10n-ja-5.4.5.1-43.19.1
libreoffice-l10n-ko-5.4.5.1-43.19.1
libreoffice-l10n-lt-5.4.5.1-43.19.1
libreoffice-l10n-nb-5.4.5.1-43.19.1
libreoffice-l10n-nl-5.4.5.1-43.19.1
libreoffice-l10n-nn-5.4.5.1-43.19.1
libreoffice-l10n-pl-5.4.5.1-43.19.1
libreoffice-l10n-pt_BR-5.4.5.1-43.19.1
libreoffice-l10n-pt_PT-5.4.5.1-43.19.1
libreoffice-l10n-ro-5.4.5.1-43.19.1
libreoffice-l10n-ru-5.4.5.1-43.19.1
libreoffice-l10n-sk-5.4.5.1-43.19.1
libreoffice-l10n-sv-5.4.5.1-43.19.1
libreoffice-l10n-uk-5.4.5.1-43.19.1
libreoffice-l10n-xh-5.4.5.1-43.19.1
libreoffice-l10n-zh_CN-5.4.5.1-43.19.1
libreoffice-l10n-zh_TW-5.4.5.1-43.19.1
libreoffice-l10n-zu-5.4.5.1-43.19.1
- SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):
libreoffice-5.4.5.1-43.19.1
libreoffice-base-5.4.5.1-43.19.1
libreoffice-base-debuginfo-5.4.5.1-43.19.1
libreoffice-base-drivers-mysql-5.4.5.1-43.19.1
libreoffice-base-drivers-mysql-debuginfo-5.4.5.1-43.19.1
libreoffice-base-drivers-postgresql-5.4.5.1-43.19.1
libreoffice-base-drivers-postgresql-debuginfo-5.4.5.1-43.19.1
libreoffice-calc-5.4.5.1-43.19.1
libreoffice-calc-debuginfo-5.4.5.1-43.19.1
libreoffice-calc-extensions-5.4.5.1-43.19.1
libreoffice-debuginfo-5.4.5.1-43.19.1
libreoffice-debugsource-5.4.5.1-43.19.1
libreoffice-draw-5.4.5.1-43.19.1
libreoffice-draw-debuginfo-5.4.5.1-43.19.1
libreoffice-filters-optional-5.4.5.1-43.19.1
libreoffice-gnome-5.4.5.1-43.19.1
libreoffice-gnome-debuginfo-5.4.5.1-43.19.1
libreoffice-impress-5.4.5.1-43.19.1
libreoffice-impress-debuginfo-5.4.5.1-43.19.1
libreoffice-mailmerge-5.4.5.1-43.19.1
libreoffice-math-5.4.5.1-43.19.1
libreoffice-math-debuginfo-5.4.5.1-43.19.1
libreoffice-officebean-5.4.5.1-43.19.1
libreoffice-officebean-debuginfo-5.4.5.1-43.19.1
libreoffice-pyuno-5.4.5.1-43.19.1
libreoffice-pyuno-debuginfo-5.4.5.1-43.19.1
libreoffice-writer-5.4.5.1-43.19.1
libreoffice-writer-debuginfo-5.4.5.1-43.19.1
libreoffice-writer-extensions-5.4.5.1-43.19.1
libreofficekit-5.4.5.1-43.19.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64):
libreoffice-debuginfo-5.4.5.1-43.19.1
libreoffice-debugsource-5.4.5.1-43.19.1
libreoffice-sdk-5.4.5.1-43.19.1
libreoffice-sdk-debuginfo-5.4.5.1-43.19.1
- SUSE Linux Enterprise Desktop 12-SP3 (noarch):
libreoffice-icon-theme-galaxy-5.4.5.1-43.19.1
libreoffice-icon-theme-tango-5.4.5.1-43.19.1
libreoffice-l10n-af-5.4.5.1-43.19.1
libreoffice-l10n-ar-5.4.5.1-43.19.1
libreoffice-l10n-ca-5.4.5.1-43.19.1
libreoffice-l10n-cs-5.4.5.1-43.19.1
libreoffice-l10n-da-5.4.5.1-43.19.1
libreoffice-l10n-de-5.4.5.1-43.19.1
libreoffice-l10n-en-5.4.5.1-43.19.1
libreoffice-l10n-es-5.4.5.1-43.19.1
libreoffice-l10n-fi-5.4.5.1-43.19.1
libreoffice-l10n-fr-5.4.5.1-43.19.1
libreoffice-l10n-gu-5.4.5.1-43.19.1
libreoffice-l10n-hi-5.4.5.1-43.19.1
libreoffice-l10n-hu-5.4.5.1-43.19.1
libreoffice-l10n-it-5.4.5.1-43.19.1
libreoffice-l10n-ja-5.4.5.1-43.19.1
libreoffice-l10n-ko-5.4.5.1-43.19.1
libreoffice-l10n-nb-5.4.5.1-43.19.1
libreoffice-l10n-nl-5.4.5.1-43.19.1
libreoffice-l10n-nn-5.4.5.1-43.19.1
libreoffice-l10n-pl-5.4.5.1-43.19.1
libreoffice-l10n-pt_BR-5.4.5.1-43.19.1
libreoffice-l10n-pt_PT-5.4.5.1-43.19.1
libreoffice-l10n-ro-5.4.5.1-43.19.1
libreoffice-l10n-ru-5.4.5.1-43.19.1
libreoffice-l10n-sk-5.4.5.1-43.19.1
libreoffice-l10n-sv-5.4.5.1-43.19.1
libreoffice-l10n-xh-5.4.5.1-43.19.1
libreoffice-l10n-zh_CN-5.4.5.1-43.19.1
libreoffice-l10n-zh_TW-5.4.5.1-43.19.1
libreoffice-l10n-zu-5.4.5.1-43.19.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
libreoffice-5.4.5.1-43.19.1
libreoffice-base-5.4.5.1-43.19.1
libreoffice-base-debuginfo-5.4.5.1-43.19.1
libreoffice-base-drivers-mysql-5.4.5.1-43.19.1
libreoffice-base-drivers-mysql-debuginfo-5.4.5.1-43.19.1
libreoffice-base-drivers-postgresql-5.4.5.1-43.19.1
libreoffice-base-drivers-postgresql-debuginfo-5.4.5.1-43.19.1
libreoffice-calc-5.4.5.1-43.19.1
libreoffice-calc-debuginfo-5.4.5.1-43.19.1
libreoffice-calc-extensions-5.4.5.1-43.19.1
libreoffice-debuginfo-5.4.5.1-43.19.1
libreoffice-debugsource-5.4.5.1-43.19.1
libreoffice-draw-5.4.5.1-43.19.1
libreoffice-draw-debuginfo-5.4.5.1-43.19.1
libreoffice-filters-optional-5.4.5.1-43.19.1
libreoffice-gnome-5.4.5.1-43.19.1
libreoffice-gnome-debuginfo-5.4.5.1-43.19.1
libreoffice-impress-5.4.5.1-43.19.1
libreoffice-impress-debuginfo-5.4.5.1-43.19.1
libreoffice-mailmerge-5.4.5.1-43.19.1
libreoffice-math-5.4.5.1-43.19.1
libreoffice-math-debuginfo-5.4.5.1-43.19.1
libreoffice-officebean-5.4.5.1-43.19.1
libreoffice-officebean-debuginfo-5.4.5.1-43.19.1
libreoffice-pyuno-5.4.5.1-43.19.1
libreoffice-pyuno-debuginfo-5.4.5.1-43.19.1
libreoffice-writer-5.4.5.1-43.19.1
libreoffice-writer-debuginfo-5.4.5.1-43.19.1
libreoffice-writer-extensions-5.4.5.1-43.19.1
libreofficekit-5.4.5.1-43.19.1
References:
https://www.suse.com/security/cve/CVE-2018-6871.html
https://bugzilla.suse.com/1080249
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0438-1: important: Security update for xen
by opensuse-security@opensuse.org 14 Feb '18
by opensuse-security@opensuse.org 14 Feb '18
14 Feb '18
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0438-1
Rating: important
References: #1027519 #1035442 #1051729 #1061081 #1067317
#1068032 #1070158 #1070159 #1070160 #1070163
#1074562 #1076116 #1076180
Cross-References: CVE-2017-15595 CVE-2017-17563 CVE-2017-17564
CVE-2017-17565 CVE-2017-17566 CVE-2017-18030
CVE-2017-5715 CVE-2017-5753 CVE-2017-5754
CVE-2018-5683
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
SUSE CaaS Platform ALL
______________________________________________________________________________
An update that solves 10 vulnerabilities and has three
fixes is now available.
Description:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks
via side effects of speculative execution, aka "Spectre" and "Meltdown"
attacks (bsc#1074562, bsc#1068032)
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS
(unbounded recursion, stack consumption, and hypervisor crash) or
possibly gain privileges via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service
(host OS crash) or gain host OS privileges in shadow mode by mapping a
certain auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service
(host OS crash) or gain host OS privileges by leveraging an incorrect
mask for reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service
(host OS crash) or gain host OS privileges by leveraging incorrect error
handling for reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service
(host OS crash) if shadow mode and log-dirty mode are in place, because
of an incorrect assertion related to M2P (bsc#1070163).
- CVE-2018-5683: The vga_draw_text function allowed local OS guest
privileged users to cause a denial of service (out-of-bounds read and
QEMU process crash) by leveraging improper memory address validation
(bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS
guest privileged users to cause a denial of service (out-of-bounds array
access and QEMU process crash) via vectors related to negative pitch
(bsc#1076180).
These non-security issues were fixed:
- bsc#1067317: pass cache=writeback|unsafe|directsync to qemu depending on
the libxl disk settings
- bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2
- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
seconds. If many domUs shutdown in parallel the backends couldn't keep up
- bsc#1027519: Added several upstream patches
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-302=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-302=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-302=1
- SUSE CaaS Platform ALL:
zypper in -t patch SUSE-CAASP-ALL-2018-302=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64):
xen-debugsource-4.9.1_08-3.26.1
xen-devel-4.9.1_08-3.26.1
- SUSE Linux Enterprise Server 12-SP3 (x86_64):
xen-4.9.1_08-3.26.1
xen-debugsource-4.9.1_08-3.26.1
xen-doc-html-4.9.1_08-3.26.1
xen-libs-32bit-4.9.1_08-3.26.1
xen-libs-4.9.1_08-3.26.1
xen-libs-debuginfo-32bit-4.9.1_08-3.26.1
xen-libs-debuginfo-4.9.1_08-3.26.1
xen-tools-4.9.1_08-3.26.1
xen-tools-debuginfo-4.9.1_08-3.26.1
xen-tools-domU-4.9.1_08-3.26.1
xen-tools-domU-debuginfo-4.9.1_08-3.26.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
xen-4.9.1_08-3.26.1
xen-debugsource-4.9.1_08-3.26.1
xen-libs-32bit-4.9.1_08-3.26.1
xen-libs-4.9.1_08-3.26.1
xen-libs-debuginfo-32bit-4.9.1_08-3.26.1
xen-libs-debuginfo-4.9.1_08-3.26.1
- SUSE CaaS Platform ALL (x86_64):
xen-debugsource-4.9.1_08-3.26.1
xen-libs-4.9.1_08-3.26.1
xen-libs-debuginfo-4.9.1_08-3.26.1
xen-tools-domU-4.9.1_08-3.26.1
xen-tools-domU-debuginfo-4.9.1_08-3.26.1
References:
https://www.suse.com/security/cve/CVE-2017-15595.html
https://www.suse.com/security/cve/CVE-2017-17563.html
https://www.suse.com/security/cve/CVE-2017-17564.html
https://www.suse.com/security/cve/CVE-2017-17565.html
https://www.suse.com/security/cve/CVE-2017-17566.html
https://www.suse.com/security/cve/CVE-2017-18030.html
https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2017-5753.html
https://www.suse.com/security/cve/CVE-2017-5754.html
https://www.suse.com/security/cve/CVE-2018-5683.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1035442
https://bugzilla.suse.com/1051729
https://bugzilla.suse.com/1061081
https://bugzilla.suse.com/1067317
https://bugzilla.suse.com/1068032
https://bugzilla.suse.com/1070158
https://bugzilla.suse.com/1070159
https://bugzilla.suse.com/1070160
https://bugzilla.suse.com/1070163
https://bugzilla.suse.com/1074562
https://bugzilla.suse.com/1076116
https://bugzilla.suse.com/1076180
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0437-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 13 Feb '18
by opensuse-security@opensuse.org 13 Feb '18
13 Feb '18
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0437-1
Rating: important
References: #1012382 #1047626 #1068032 #1070623 #1073311
#1073792 #1073874 #1075091 #1075908 #1075994
#1076017 #1076110 #1076154 #1076278 #1077355
#1077560 #1077922 #893777 #893949 #902893
#951638
Cross-References: CVE-2015-1142857 CVE-2017-13215 CVE-2017-17741
CVE-2017-17805 CVE-2017-17806 CVE-2017-18079
CVE-2017-5715 CVE-2018-1000004
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Module for Public Cloud 12
______________________________________________________________________________
An update that solves 8 vulnerabilities and has 13 fixes is
now available.
Description:
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized
disclosure
of information to an attacker with local user access via a side-channel
analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building
the Linux Kernel with return trampolines aka "retpolines".
- CVE-2017-18079: drivers/input/serio/i8042.c allowed attackers to cause a
denial of service (NULL pointer dereference and system crash) or
possibly have unspecified other impact because the port->exists value
can change after it is validated (bnc#1077922)
- CVE-2015-1142857: Prevent guests from sending ethernet flow control
pause frames via the PF (bnc#1077355)
- CVE-2017-17741: KVM allowed attackers to obtain potentially sensitive
information from kernel memory, aka a write_mmio stack-based
out-of-bounds read (bnc#1073311)
- CVE-2017-13215: Prevent elevation of privilege (bnc#1075908)
- CVE-2018-1000004: Prevent race condition in the sound system, this could
have lead a deadlock and denial of service condition (bnc#1076017)
- CVE-2017-17806: The HMAC implementation did not validate that the
underlying cryptographic hash algorithm is unkeyed, allowing a local
attacker able to use the AF_ALG-based hash interface
(CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm
(CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by
executing a crafted sequence of system calls that encounter a missing
SHA-3 initialization (bnc#1073874)
- CVE-2017-17805: The Salsa20 encryption algorithm did not correctly
handle zero-length inputs, allowing a local attacker able to use the
AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to
cause a denial of service (uninitialized-memory free and kernel crash)
or have unspecified other impact by executing a crafted sequence of
system calls that use the blkcipher_walk API. Both the generic
implementation (crypto/salsa20_generic.c) and x86 implementation
(arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792)
The following non-security bugs were fixed:
- bcache allocator: send discards with correct size (bsc#1047626).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: Abstract out stuff needed for sorting (bsc#1076110).
- bcache: Add a cond_resched() call to gc (bsc#1076110).
- bcache: Add a real GC_MARK_RECLAIMABLE (bsc#1076110).
- bcache: Add bch_bkey_equal_header() (bsc#1076110).
- bcache: Add bch_btree_keys_u64s_remaining() (bsc#1076110).
- bcache: Add bch_keylist_init_single() (bsc#1047626).
- bcache: Add btree_insert_node() (bnc#951638).
- bcache: Add btree_map() functions (bsc#1047626).
- bcache: Add btree_node_write_sync() (bsc#1076110).
- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).
- bcache: Add make_btree_freeing_key() (bsc#1076110).
- bcache: Add on error panic/unregister setting (bsc#1047626).
- bcache: Add struct bset_sort_state (bsc#1076110).
- bcache: Add struct btree_keys (bsc#1076110).
- bcache: Allocate bounce buffers with GFP_NOWAIT (bsc#1076110).
- bcache: Avoid deadlocking in garbage collection (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: Better alloc tracepoints (bsc#1076110).
- bcache: Better full stripe scanning (bsc#1076110).
- bcache: Bkey indexing renaming (bsc#1076110).
- bcache: Break up struct search (bsc#1076110).
- bcache: Btree verify code improvements (bsc#1076110).
- bcache: Bypass torture test (bsc#1076110).
- bcache: Change refill_dirty() to always scan entire disk if necessary
(bsc#1076110).
- bcache: Clean up cache_lookup_fn (bsc#1076110).
- bcache: Clean up keylist code (bnc#951638).
- bcache: Convert bch_btree_insert() to bch_btree_map_leaf_nodes()
(bsc#1076110).
- bcache: Convert bch_btree_read_async() to bch_btree_map_keys()
(bsc#1076110).
- bcache: Convert btree_insert_check_key() to btree_insert_node()
(bnc#951638).
- bcache: Convert btree_iter to struct btree_keys (bsc#1076110).
- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert debug code to btree_keys (bsc#1076110).
- bcache: Convert gc to a kthread (bsc#1047626).
- bcache: Convert sorting to btree_keys (bsc#1076110).
- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert writeback to a kthread (bsc#1076110).
- bcache: Correct return value for sysfs attach errors (bsc#1076110).
- bcache: Debug code improvements (bsc#1076110).
- bcache: Delete some slower inline asm (bsc#1047626).
- bcache: Do bkey_put() in btree_split() error path (bsc#1076110).
- bcache: Do not bother with bucket refcount for btree node allocations
(bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API
(bsc#1076110).
- bcache: Do not return -EINTR when insert finished (bsc#1076110).
- bcache: Do not touch bucket gen for dirty ptrs (bsc#1076110).
- bcache: Do not use op->insert_collision (bsc#1076110).
- bcache: Drop some closure stuff (bsc#1076110).
- bcache: Drop unneeded blk_sync_queue() calls (bsc#1047626).
- bcache: Explicitly track btree node's parent (bnc#951638).
- bcache: Fix a bug recovering from unclean shutdown (bsc#1047626).
- bcache: Fix a bug when detaching (bsc#951638).
- bcache: Fix a journal replay bug (bsc#1076110).
- bcache: Fix a journalling performance bug (bnc#893777).
- bcache: Fix a journalling reclaim after recovery bug (bsc#1047626).
- bcache: Fix a lockdep splat (bnc#893777).
- bcache: Fix a lockdep splat in an error path (bnc#951638).
- bcache: Fix a null ptr deref in journal replay (bsc#1047626).
- bcache: Fix a race when freeing btree nodes (bsc#1076110).
- bcache: Fix a shutdown bug (bsc#951638).
- bcache: Fix an infinite loop in journal replay (bsc#1047626).
- bcache: Fix another bug recovering from unclean shutdown (bsc#1076110).
- bcache: Fix another compiler warning on m68k (bsc#1076110).
- bcache: Fix auxiliary search trees for key size > cacheline size
(bsc#1076110).
- bcache: Fix bch_ptr_bad() (bsc#1047626).
- bcache: Fix building error on MIPS (bsc#1076110).
- bcache: Fix dirty_data accounting (bsc#1076110).
- bcache: Fix discard granularity (bsc#1047626).
- bcache: Fix flash_dev_cache_miss() for real this time (bsc#1076110).
- bcache: Fix for can_attach_cache() (bsc#1047626).
- bcache: Fix heap_peek() macro (bsc#1047626).
- bcache: Fix leak of bdev reference (bsc#1076110).
- bcache: Fix more early shutdown bugs (bsc#951638).
- bcache: Fix moving_gc deadlocking with a foreground write (bsc#1076110).
- bcache: Fix moving_pred() (bsc#1047626).
- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- bcache: Fix to remove the rcu_sched stalls (bsc#1047626).
- bcache: Have btree_split() insert into parent directly (bsc#1076110).
- bcache: Improve bucket_prio() calculation (bsc#1047626).
- bcache: Improve priority_stats (bsc#1047626).
- bcache: Incremental gc (bsc#1076110).
- bcache: Insert multiple keys at a time (bnc#951638).
- bcache: Kill bch_next_recurse_key() (bsc#1076110).
- bcache: Kill btree_io_wq (bsc#1076110).
- bcache: Kill bucket->gc_gen (bsc#1076110).
- bcache: Kill dead cgroup code (bsc#1076110).
- bcache: Kill op->cl (bsc#1076110).
- bcache: Kill op->replace (bsc#1076110).
- bcache: Kill sequential_merge option (bsc#1076110).
- bcache: Kill unaligned bvec hack (bsc#1076110).
- bcache: Kill unused freelist (bsc#1076110).
- bcache: Make bch_keylist_realloc() take u64s, not nptrs (bsc#1076110).
- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1076110).
- bcache: Minor btree cache fix (bsc#1047626).
- bcache: Minor fixes from kbuild robot (bsc#1076110).
- bcache: Move insert_fixup() to btree_keys_ops (bsc#1076110).
- bcache: Move keylist out of btree_op (bsc#1047626).
- bcache: Move sector allocator to alloc.c (bsc#1076110).
- bcache: Move some stuff to btree.c (bsc#1076110).
- bcache: Move spinlock into struct time_stats (bsc#1076110).
- bcache: New writeback PD controller (bsc#1047626).
- bcache: PRECEDING_KEY() (bsc#1047626).
- bcache: Performance fix for when journal entry is full (bsc#1047626).
- bcache: Prune struct btree_op (bsc#1076110).
- bcache: Pull on disk data structures out into a separate header
(bsc#1076110).
- bcache: RESERVE_PRIO is too small by one when prio_buckets() is a power
of two (bsc#1076110).
- bcache: Really show state of work pending bit (bsc#1076110).
- bcache: Refactor bset_tree sysfs stats (bsc#1076110).
- bcache: Refactor journalling flow control (bnc#951638).
- bcache: Refactor read request code a bit (bsc#1076110).
- bcache: Refactor request_write() (bnc#951638).
- bcache: Remove deprecated create_workqueue (bsc#1076110).
- bcache: Remove redundant block_size assignment (bsc#1047626).
- bcache: Remove redundant parameter for cache_alloc() (bsc#1047626).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: Remove unnecessary check in should_split() (bsc#1076110).
- bcache: Remove/fix some header dependencies (bsc#1047626).
- bcache: Rename/shuffle various code around (bsc#1076110).
- bcache: Rework allocator reserves (bsc#1076110).
- bcache: Rework btree cache reserve handling (bsc#1076110).
- bcache: Split out sort_extent_cmp() (bsc#1076110).
- bcache: Stripe size isn't necessarily a power of two (bnc#893949).
- bcache: Trivial error handling fix (bsc#1047626).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: Use a mempool for mergesort temporary space (bsc#1076110).
- bcache: Use blkdev_issue_discard() (bnc#951638).
- bcache: Use ida for bcache block dev minor (bsc#1047626).
- bcache: Use uninterruptible sleep in writeback (bsc#1076110).
- bcache: Zero less memory (bsc#1076110).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: add mutex lock for bch_is_open (bnc#902893).
- bcache: allows use of register in udev to avoid "device_busy" error
(bsc#1047626).
- bcache: bcache_write tracepoint was crashing (bsc#1076110).
- bcache: bch_(btree|extent)_ptr_invalid() (bsc#1076110).
- bcache: bch_allocator_thread() is not freezable (bsc#1047626).
- bcache: bch_gc_thread() is not freezable (bsc#1047626).
- bcache: bch_writeback_thread() is not freezable (bsc#1076110).
- bcache: btree locking rework (bsc#1076110).
- bcache: bugfix - gc thread now gets woken when cache is full
(bsc#1047626).
- bcache: bugfix - moving_gc now moves only correct buckets (bsc#1047626).
- bcache: bugfix for race between moving_gc and bucket_invalidate
(bsc#1076110).
- bcache: check ca->alloc_thread initialized before wake up it
(bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: cleaned up error handling around register_cache() (bsc#1047626).
- bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing
device (bsc#1047626).
- bcache: correct cache_dirty_target in __update_writeback_rate()
(bsc#1076110).
- bcache: defensively handle format strings (bsc#1047626).
- bcache: do not embed 'return' statements in closure macros (bsc#1076110).
- bcache: do not subtract sectors_to_gc for bypassed IO (bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment
notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bsc#1076110).
- bcache: fix BUG_ON due to integer overflow with GC_SECTORS_USED
(bsc#1047626).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: fix a livelock when we cause a huge number of cache misses
(bsc#1047626).
- bcache: fix bch_hprint crash and improve output (bsc#1076110).
- bcache: fix crash in bcache_btree_node_alloc_fail tracepoint
(bsc#1047626).
- bcache: fix crash on shutdown in passthrough mode (bsc#1076110).
- bcache: fix for gc and write-back race (bsc#1076110).
- bcache: fix for gc and writeback race (bsc#1047626).
- bcache: fix for gc crashing when no sectors are used (bsc#1047626).
- bcache: fix lockdep warnings on shutdown (bsc#1047626).
- bcache: fix race of writeback thread starting before complete
initialization (bsc#1076110).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix sparse non static symbol warning (bsc#1076110).
- bcache: fix typo in bch_bkey_equal_header (bsc#1076110).
- bcache: fix uninterruptible sleep in writeback thread (bsc#1076110).
- bcache: fix use-after-free in btree_gc_coalesce() (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bsc#1076110).
- bcache: gc does not work when triggering by manual command (bsc#1076110).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: initialize dirty stripes in flash_dev_run() (bsc#1076110).
- bcache: kill closure locking code (bsc#1076110).
- bcache: kill closure locking usage (bnc#951638).
- bcache: kill index() (bsc#1047626).
- bcache: kthread do not set writeback task to INTERUPTIBLE (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean
(bsc#1076110).
- bcache: partition support: add 16 minors per bcacheN device
(bsc#1076110).
- bcache: pr_err: more meaningful error message when nr_stripes is invalid
(bsc#1076110).
- bcache: prevent crash on changing writeback_running (bsc#1076110).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bsc#1076110).
- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails
(bsc#1047626).
- bcache: remove nested function usage (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache: stop moving_gc marking buckets that can't be moved (bsc#1047626).
- bcache: try to set b->parent properly (bsc#1076110).
- bcache: update bch_bkey_try_merge (bsc#1076110).
- bcache: update bio->bi_opf bypass/writeback REQ_ flag hints
(bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: update document info (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use kvfree() in various places (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up()
(bsc#1076110).
- bcache: wait for buckets when allocating new btree root (bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- fork: clear thread stack upon allocation (bsc#1077560).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076154).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).
- md: more open-coded offset_in_page() (bsc#1076110).
- nfsd: do not share group_info among threads (bsc@1070623).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active
(bsc#1068032).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994
bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2018-301=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2018-301=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
kernel-default-3.12.61-52.119.1
kernel-default-base-3.12.61-52.119.1
kernel-default-base-debuginfo-3.12.61-52.119.1
kernel-default-debuginfo-3.12.61-52.119.1
kernel-default-debugsource-3.12.61-52.119.1
kernel-default-devel-3.12.61-52.119.1
kernel-syms-3.12.61-52.119.1
- SUSE Linux Enterprise Server 12-LTSS (noarch):
kernel-devel-3.12.61-52.119.1
kernel-macros-3.12.61-52.119.1
kernel-source-3.12.61-52.119.1
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
kernel-xen-3.12.61-52.119.1
kernel-xen-base-3.12.61-52.119.1
kernel-xen-base-debuginfo-3.12.61-52.119.1
kernel-xen-debuginfo-3.12.61-52.119.1
kernel-xen-debugsource-3.12.61-52.119.1
kernel-xen-devel-3.12.61-52.119.1
kgraft-patch-3_12_61-52_119-default-1-1.7.1
kgraft-patch-3_12_61-52_119-xen-1-1.7.1
- SUSE Linux Enterprise Server 12-LTSS (s390x):
kernel-default-man-3.12.61-52.119.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.61-52.119.1
kernel-ec2-debuginfo-3.12.61-52.119.1
kernel-ec2-debugsource-3.12.61-52.119.1
kernel-ec2-devel-3.12.61-52.119.1
kernel-ec2-extra-3.12.61-52.119.1
kernel-ec2-extra-debuginfo-3.12.61-52.119.1
References:
https://www.suse.com/security/cve/CVE-2015-1142857.html
https://www.suse.com/security/cve/CVE-2017-13215.html
https://www.suse.com/security/cve/CVE-2017-17741.html
https://www.suse.com/security/cve/CVE-2017-17805.html
https://www.suse.com/security/cve/CVE-2017-17806.html
https://www.suse.com/security/cve/CVE-2017-18079.html
https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1047626
https://bugzilla.suse.com/1068032
https://bugzilla.suse.com/1070623
https://bugzilla.suse.com/1073311
https://bugzilla.suse.com/1073792
https://bugzilla.suse.com/1073874
https://bugzilla.suse.com/1075091
https://bugzilla.suse.com/1075908
https://bugzilla.suse.com/1075994
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1076110
https://bugzilla.suse.com/1076154
https://bugzilla.suse.com/1076278
https://bugzilla.suse.com/1077355
https://bugzilla.suse.com/1077560
https://bugzilla.suse.com/1077922
https://bugzilla.suse.com/893777
https://bugzilla.suse.com/893949
https://bugzilla.suse.com/902893
https://bugzilla.suse.com/951638
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0436-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)
by opensuse-security@opensuse.org 13 Feb '18
by opensuse-security@opensuse.org 13 Feb '18
13 Feb '18
SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0436-1
Rating: important
References: #1073230
Cross-References: CVE-2017-17712
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for the Linux Kernel 4.4.103-6_38 fixes one issue.
The following security issue was fixed:
- CVE-2017-17712: The raw_sendmsg() function had a race condition that
lead to uninitialized stack pointer usage. This allowed a local user to
execute code and gain privileges (bsc#1073230).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-299=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):
kgraft-patch-4_4_103-6_38-default-2-2.1
kgraft-patch-4_4_103-6_38-default-debuginfo-2-2.1
References:
https://www.suse.com/security/cve/CVE-2017-17712.html
https://bugzilla.suse.com/1073230
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0433-1: important: Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)
by opensuse-security@opensuse.org 13 Feb '18
by opensuse-security@opensuse.org 13 Feb '18
13 Feb '18
SUSE Security Update: Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0433-1
Rating: important
References: #1073230
Cross-References: CVE-2017-17712
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for the Linux Kernel 4.4.103-6_33 fixes one issue.
The following security issue was fixed:
- CVE-2017-17712: The raw_sendmsg() function had a race condition that
lead to uninitialized stack pointer usage. This allowed a local user to
execute code and gain privileges (bsc#1073230).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-298=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):
kgraft-patch-4_4_103-6_33-default-2-2.1
kgraft-patch-4_4_103-6_33-default-debuginfo-2-2.1
References:
https://www.suse.com/security/cve/CVE-2017-17712.html
https://bugzilla.suse.com/1073230
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0431-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)
by opensuse-security@opensuse.org 13 Feb '18
by opensuse-security@opensuse.org 13 Feb '18
13 Feb '18
SUSE Security Update: Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0431-1
Rating: important
References: #1073230
Cross-References: CVE-2017-17712
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for the Linux Kernel 4.4.92-6_30 fixes one issue.
The following security issue was fixed:
- CVE-2017-17712: The raw_sendmsg() function had a race condition that
lead to uninitialized stack pointer usage. This allowed a local user to
execute code and gain privileges (bsc#1073230).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-296=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):
kgraft-patch-4_4_92-6_30-default-2-2.1
kgraft-patch-4_4_92-6_30-default-debuginfo-2-2.1
References:
https://www.suse.com/security/cve/CVE-2017-17712.html
https://bugzilla.suse.com/1073230
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2018:0429-1: important: Security update for leptonica
by opensuse-security@opensuse.org 12 Feb '18
by opensuse-security@opensuse.org 12 Feb '18
12 Feb '18
openSUSE Security Update: Security update for leptonica
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0429-1
Rating: important
References: #1079358
Cross-References: CVE-2018-3836
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for leptonica fixes the following issues:
- CVE-2018-3836: Fixes a command injection vulnerability (boo#1079358
TALOS-2018-0516)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-158=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
leptonica-debugsource-1.72-6.1
leptonica-devel-1.72-6.1
leptonica-tools-1.72-6.1
leptonica-tools-debuginfo-1.72-6.1
liblept4-1.72-6.1
liblept4-debuginfo-1.72-6.1
- openSUSE Leap 42.3 (x86_64):
liblept4-32bit-1.72-6.1
liblept4-debuginfo-32bit-1.72-6.1
References:
https://www.suse.com/security/cve/CVE-2018-3836.html
https://bugzilla.suse.com/1079358
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0428-1: important: Security update for libreoffice
by opensuse-security@opensuse.org 12 Feb '18
by opensuse-security@opensuse.org 12 Feb '18
12 Feb '18
SUSE Security Update: Security update for libreoffice
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0428-1
Rating: important
References: #1080249
Cross-References: CVE-2018-6871
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libreoffice fixes the following issues:
LibreOffice was updated to 5.4.5.1:
- CVE-2018-6871: Fixes data exposure when using WEBSERVICE (bsc#1080249)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2018-295=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-295=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-295=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
libreoffice-5.4.5.1-40.24.1
libreoffice-base-5.4.5.1-40.24.1
libreoffice-base-debuginfo-5.4.5.1-40.24.1
libreoffice-base-drivers-mysql-5.4.5.1-40.24.1
libreoffice-base-drivers-mysql-debuginfo-5.4.5.1-40.24.1
libreoffice-base-drivers-postgresql-5.4.5.1-40.24.1
libreoffice-base-drivers-postgresql-debuginfo-5.4.5.1-40.24.1
libreoffice-calc-5.4.5.1-40.24.1
libreoffice-calc-debuginfo-5.4.5.1-40.24.1
libreoffice-calc-extensions-5.4.5.1-40.24.1
libreoffice-debuginfo-5.4.5.1-40.24.1
libreoffice-debugsource-5.4.5.1-40.24.1
libreoffice-draw-5.4.5.1-40.24.1
libreoffice-draw-debuginfo-5.4.5.1-40.24.1
libreoffice-filters-optional-5.4.5.1-40.24.1
libreoffice-gnome-5.4.5.1-40.24.1
libreoffice-gnome-debuginfo-5.4.5.1-40.24.1
libreoffice-impress-5.4.5.1-40.24.1
libreoffice-impress-debuginfo-5.4.5.1-40.24.1
libreoffice-mailmerge-5.4.5.1-40.24.1
libreoffice-math-5.4.5.1-40.24.1
libreoffice-math-debuginfo-5.4.5.1-40.24.1
libreoffice-officebean-5.4.5.1-40.24.1
libreoffice-officebean-debuginfo-5.4.5.1-40.24.1
libreoffice-pyuno-5.4.5.1-40.24.1
libreoffice-pyuno-debuginfo-5.4.5.1-40.24.1
libreoffice-writer-5.4.5.1-40.24.1
libreoffice-writer-debuginfo-5.4.5.1-40.24.1
libreoffice-writer-extensions-5.4.5.1-40.24.1
libreofficekit-5.4.5.1-40.24.1
- SUSE Linux Enterprise Workstation Extension 12-SP2 (noarch):
libreoffice-icon-theme-galaxy-5.4.5.1-40.24.1
libreoffice-icon-theme-tango-5.4.5.1-40.24.1
libreoffice-l10n-af-5.4.5.1-40.24.1
libreoffice-l10n-ar-5.4.5.1-40.24.1
libreoffice-l10n-bg-5.4.5.1-40.24.1
libreoffice-l10n-ca-5.4.5.1-40.24.1
libreoffice-l10n-cs-5.4.5.1-40.24.1
libreoffice-l10n-da-5.4.5.1-40.24.1
libreoffice-l10n-de-5.4.5.1-40.24.1
libreoffice-l10n-en-5.4.5.1-40.24.1
libreoffice-l10n-es-5.4.5.1-40.24.1
libreoffice-l10n-fi-5.4.5.1-40.24.1
libreoffice-l10n-fr-5.4.5.1-40.24.1
libreoffice-l10n-gu-5.4.5.1-40.24.1
libreoffice-l10n-hi-5.4.5.1-40.24.1
libreoffice-l10n-hr-5.4.5.1-40.24.1
libreoffice-l10n-hu-5.4.5.1-40.24.1
libreoffice-l10n-it-5.4.5.1-40.24.1
libreoffice-l10n-ja-5.4.5.1-40.24.1
libreoffice-l10n-ko-5.4.5.1-40.24.1
libreoffice-l10n-lt-5.4.5.1-40.24.1
libreoffice-l10n-nb-5.4.5.1-40.24.1
libreoffice-l10n-nl-5.4.5.1-40.24.1
libreoffice-l10n-nn-5.4.5.1-40.24.1
libreoffice-l10n-pl-5.4.5.1-40.24.1
libreoffice-l10n-pt_BR-5.4.5.1-40.24.1
libreoffice-l10n-pt_PT-5.4.5.1-40.24.1
libreoffice-l10n-ro-5.4.5.1-40.24.1
libreoffice-l10n-ru-5.4.5.1-40.24.1
libreoffice-l10n-sk-5.4.5.1-40.24.1
libreoffice-l10n-sv-5.4.5.1-40.24.1
libreoffice-l10n-uk-5.4.5.1-40.24.1
libreoffice-l10n-xh-5.4.5.1-40.24.1
libreoffice-l10n-zh_CN-5.4.5.1-40.24.1
libreoffice-l10n-zh_TW-5.4.5.1-40.24.1
libreoffice-l10n-zu-5.4.5.1-40.24.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 x86_64):
libreoffice-debuginfo-5.4.5.1-40.24.1
libreoffice-debugsource-5.4.5.1-40.24.1
libreoffice-sdk-5.4.5.1-40.24.1
libreoffice-sdk-debuginfo-5.4.5.1-40.24.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libreoffice-5.4.5.1-40.24.1
libreoffice-base-5.4.5.1-40.24.1
libreoffice-base-debuginfo-5.4.5.1-40.24.1
libreoffice-base-drivers-mysql-5.4.5.1-40.24.1
libreoffice-base-drivers-mysql-debuginfo-5.4.5.1-40.24.1
libreoffice-base-drivers-postgresql-5.4.5.1-40.24.1
libreoffice-base-drivers-postgresql-debuginfo-5.4.5.1-40.24.1
libreoffice-calc-5.4.5.1-40.24.1
libreoffice-calc-debuginfo-5.4.5.1-40.24.1
libreoffice-calc-extensions-5.4.5.1-40.24.1
libreoffice-debuginfo-5.4.5.1-40.24.1
libreoffice-debugsource-5.4.5.1-40.24.1
libreoffice-draw-5.4.5.1-40.24.1
libreoffice-draw-debuginfo-5.4.5.1-40.24.1
libreoffice-filters-optional-5.4.5.1-40.24.1
libreoffice-gnome-5.4.5.1-40.24.1
libreoffice-gnome-debuginfo-5.4.5.1-40.24.1
libreoffice-impress-5.4.5.1-40.24.1
libreoffice-impress-debuginfo-5.4.5.1-40.24.1
libreoffice-mailmerge-5.4.5.1-40.24.1
libreoffice-math-5.4.5.1-40.24.1
libreoffice-math-debuginfo-5.4.5.1-40.24.1
libreoffice-officebean-5.4.5.1-40.24.1
libreoffice-officebean-debuginfo-5.4.5.1-40.24.1
libreoffice-pyuno-5.4.5.1-40.24.1
libreoffice-pyuno-debuginfo-5.4.5.1-40.24.1
libreoffice-writer-5.4.5.1-40.24.1
libreoffice-writer-debuginfo-5.4.5.1-40.24.1
libreoffice-writer-extensions-5.4.5.1-40.24.1
libreofficekit-5.4.5.1-40.24.1
- SUSE Linux Enterprise Desktop 12-SP2 (noarch):
libreoffice-icon-theme-galaxy-5.4.5.1-40.24.1
libreoffice-icon-theme-tango-5.4.5.1-40.24.1
libreoffice-l10n-af-5.4.5.1-40.24.1
libreoffice-l10n-ar-5.4.5.1-40.24.1
libreoffice-l10n-ca-5.4.5.1-40.24.1
libreoffice-l10n-cs-5.4.5.1-40.24.1
libreoffice-l10n-da-5.4.5.1-40.24.1
libreoffice-l10n-de-5.4.5.1-40.24.1
libreoffice-l10n-en-5.4.5.1-40.24.1
libreoffice-l10n-es-5.4.5.1-40.24.1
libreoffice-l10n-fi-5.4.5.1-40.24.1
libreoffice-l10n-fr-5.4.5.1-40.24.1
libreoffice-l10n-gu-5.4.5.1-40.24.1
libreoffice-l10n-hi-5.4.5.1-40.24.1
libreoffice-l10n-hu-5.4.5.1-40.24.1
libreoffice-l10n-it-5.4.5.1-40.24.1
libreoffice-l10n-ja-5.4.5.1-40.24.1
libreoffice-l10n-ko-5.4.5.1-40.24.1
libreoffice-l10n-nb-5.4.5.1-40.24.1
libreoffice-l10n-nl-5.4.5.1-40.24.1
libreoffice-l10n-nn-5.4.5.1-40.24.1
libreoffice-l10n-pl-5.4.5.1-40.24.1
libreoffice-l10n-pt_BR-5.4.5.1-40.24.1
libreoffice-l10n-pt_PT-5.4.5.1-40.24.1
libreoffice-l10n-ro-5.4.5.1-40.24.1
libreoffice-l10n-ru-5.4.5.1-40.24.1
libreoffice-l10n-sk-5.4.5.1-40.24.1
libreoffice-l10n-sv-5.4.5.1-40.24.1
libreoffice-l10n-xh-5.4.5.1-40.24.1
libreoffice-l10n-zh_CN-5.4.5.1-40.24.1
libreoffice-l10n-zh_TW-5.4.5.1-40.24.1
libreoffice-l10n-zu-5.4.5.1-40.24.1
References:
https://www.suse.com/security/cve/CVE-2018-6871.html
https://bugzilla.suse.com/1080249
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2018:0420-1: important: Security update for freetype2
by opensuse-security@opensuse.org 12 Feb '18
by opensuse-security@opensuse.org 12 Feb '18
12 Feb '18
openSUSE Security Update: Security update for freetype2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0420-1
Rating: important
References: #1028103 #1035807 #1036457 #1079600
Cross-References: CVE-2016-10244 CVE-2017-7864 CVE-2017-8105
CVE-2017-8287
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for freetype2 fixes the following security issues:
- CVE-2016-10244: Make sure that the parse_charstrings function in
type1/t1load.c does ensure that a font contains a glyph name to prevent
a DoS through a heap-based buffer over-read or possibly have unspecified
other impact via a crafted file (bsc#1028103)
- CVE-2017-8105: Fix an out-of-bounds write caused by a heap-based buffer
overflow related to the t1_decoder_parse_charstrings function in
psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
overflow related to the t1_builder_close_contour function in
psaux/psobjs.c (bsc#1036457)
- Fix several integer overflow issues in truetype/ttinterp.c (bsc#1079600)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-156=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
freetype2-debugsource-2.6.3-5.3.1
freetype2-devel-2.6.3-5.3.1
ft2demos-2.6.3-5.3.1
libfreetype6-2.6.3-5.3.1
libfreetype6-debuginfo-2.6.3-5.3.1
- openSUSE Leap 42.3 (x86_64):
freetype2-devel-32bit-2.6.3-5.3.1
libfreetype6-32bit-2.6.3-5.3.1
libfreetype6-debuginfo-32bit-2.6.3-5.3.1
References:
https://www.suse.com/security/cve/CVE-2016-10244.html
https://www.suse.com/security/cve/CVE-2017-7864.html
https://www.suse.com/security/cve/CVE-2017-8105.html
https://www.suse.com/security/cve/CVE-2017-8287.html
https://bugzilla.suse.com/1028103
https://bugzilla.suse.com/1035807
https://bugzilla.suse.com/1036457
https://bugzilla.suse.com/1079600
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0416-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 09 Feb '18
by opensuse-security@opensuse.org 09 Feb '18
09 Feb '18
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0416-1
Rating: important
References: #1012382 #1012917 #1019784 #1022476 #1031717
#1038078 #1038085 #1043652 #1048585 #1052360
#1060279 #1066223 #1066842 #1068032 #1068038
#1068569 #1068984 #1069160 #1070799 #1072163
#1072484 #1072589 #1073229 #1073928 #1074134
#1074392 #1074488 #1074621 #1074709 #1074839
#1074847 #1075066 #1075078 #1075087 #1075091
#1075428 #1075617 #1075621 #1075627 #1075994
#1076017 #1076110 #1076806 #1076809 #1076872
#1076899 #1077068 #1077560 #1077592 #1078526
#1078681 #963844 #988524
Cross-References: CVE-2017-15129 CVE-2017-17712 CVE-2017-17862
CVE-2017-17864 CVE-2017-18017 CVE-2017-5715
CVE-2018-1000004 CVE-2018-5332 CVE-2018-5333
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise High Availability 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________
An update that solves 9 vulnerabilities and has 44 fixes is
now available.
Description:
The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.114 to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized
disclosure of information to an attacker with local user access via a
side-channel analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building
the Linux Kernel with return trampolines aka "retpolines".
- CVE-2017-15129: A use-after-free vulnerability was found in network
namespaces code affecting the Linux kernel The function
get_net_ns_by_id() in net/core/net_namespace.c did not check for the
net::count value after it has found a peer network in netns_ids idr,
which could lead to double free and memory corruption. This
vulnerability could allow an unprivileged local user to induce kernel
memory corruption on the system, leading to a crash. Due to the nature
of the flaw, privilege escalation cannot be fully ruled out, although it
is thought to be unlikely (bnc#1074839).
- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the
Linux kernel has a race condition in inet->hdrincl that leads to
uninitialized stack pointer usage; this allowed a local user to execute
code and gain privileges (bnc#1073229).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignored
unreachable code, even though it would still be processed by JIT
compilers. This behavior, also considered an improper branch-pruning
logic issue, could possibly be used by local users for denial of service
(bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled
states_equal comparisons between the pointer data type and the
UNKNOWN_VALUE data type, which allowed local users to obtain potentially
sensitive address information, aka a "pointer leak (bnc#1073928).
- CVE-2017-18017: The tcpmss_mangle_packet function in
net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
to cause a denial of service (use-after-free and memory corruption) or
possibly have unspecified other impact by leveraging the presence of
xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability
existed in the sound system, this can lead to a deadlock and denial of
service condition (bnc#1076017).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
did not validate a value that is used during DMA page allocation,
leading to a heap-based out-of-bounds write (related to the
rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
net/rds/rdma.c mishandled cases where page pinning fails or an invalid
address is supplied, leading to an rds_atomic_free_op NULL pointer
dereference (bnc#1075617).
The following non-security bugs were fixed:
- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).
- ACPI / scan: Prefer devices without _HID/_CID for _ADR matching
(bnc#1012382).
- ARC: uaccess: dont use "l" gcc inline asm constraint modifier
(bnc#1012382).
- Fix EX_SIZE. We do not have the patches that shave off parts of the
exception data.
- Fix build error in vma.c (bnc#1012382).
- Fix mishandling of cases with MSR not being present (writing to MSR even
though _state == -1).
- Fix return value from ib[rs|pb]_enabled()
- Input: trackpoint - force 3 buttons if 0 button is reported
(bnc#1012382).
- KVM: s390: Enable all facility bits that are known good for passthrough
(bsc#1076806).
- Kabi: Keep KVM stable after enable s390 wire up bpb feature
(bsc#1076806).
- Move RFI sysfs to a separate patch
- Move the RFI debug code into separate patch.
- Re-enable fixup detection by CPU type in case hypervisor call fails.
- Revert "Bluetooth: btusb: driver to enable the usb-wakeup feature"
(bnc#1012382).
- Revert "Re-enable fixup detection by CPU type in case hypervisor call
fails." The firmware update is required for the existing instructions to
also do the cache flush.
- Revert "arm64: alternatives: add enable parameter to conditional asm
macros" (bsc#1068032).
- Revert "drm/armada: Fix compile fail" (bnc#1012382).
- Revert "drm/radeon: dont switch vt on suspend" (bnc#1012382).
- Revert "ipsec: Fix aborted xfrm policy dump crash" (kabi).
- Revert "kaiser: vmstat show NR_KAISERTABLE as nr_overhead" (kabi).
- Revert "lib/genalloc.c: make the avail variable an atomic_long_t" (kabi).
- Revert "module: Add retpoline tag to VERMAGIC" (bnc#1012382 kabi).
- Revert "netlink: add a start callback for starting a netlink dump"
(kabi).
- Revert "ocfs2: should wait dio before inode lock in ocfs2_setattr()"
(bnc#1012382).
- Revert "s390/kbuild: enable modversions for symbols exported from asm"
(bnc#1012382).
- Revert "sched/deadline: Use the revised wakeup rule for suspending
constrained dl tasks" (kabi).
- Revert "scsi: libsas: align sata_device's rps_resp on a cacheline"
(kabi).
- Revert "spi: SPI_FSL_DSPI should depend on HAS_DMA" (bnc#1012382).
- Revert "userfaultfd: selftest: vm: allow to build in vm/ directory"
(bnc#1012382).
- Revert "x86/efi: Build our own page table structures" (bnc#1012382).
- Revert "x86/efi: Hoist page table switching code into efi_call_virt()"
(bnc#1012382).
- Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
(bnc#1012382).
- SMB2: Fix share type handling (bnc#1074392).
- Set supported_modules_check 1 (bsc#1072163).
- Update patches.suse/powerpc-Secure-memory-rfi-flush-SLE12SP3.patch
(bsc#1068032, bsc#1075087).
- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).
- af_key: fix buffer overread in verify_address_len() (bnc#1012382).
- afs: Adjust mode bits processing (bnc#1012382).
- afs: Connect up the CB.ProbeUuid (bnc#1012382).
- afs: Fix afs_kill_pages() (bnc#1012382).
- afs: Fix missing put_page() (bnc#1012382).
- afs: Fix page leak in afs_write_begin() (bnc#1012382).
- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).
- afs: Flush outstanding writes when an fd is closed (bnc#1012382).
- afs: Migrate vlocation fields to 64-bit (bnc#1012382).
- afs: Populate and use client modification time (bnc#1012382).
- afs: Populate group ID from vnode status (bnc#1012382).
- afs: Prevent callback expiry timer overflow (bnc#1012382).
- alpha: fix build failures (bnc#1012382).
- alsa: aloop: Fix inconsistent format due to incomplete rule
(bsc#1031717).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).
- alsa: aloop: Release cable upon open error path (bsc#1031717).
- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds
(bsc#1031717).
- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).
- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).
- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).
- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant
(bsc#1031717).
- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).
- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).
- alsa: hda - Fix headset microphone detection for ASUS N551 and N751
(bsc#1031717).
- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).
- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).
- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).
- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).
- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).
- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).
- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).
- alsa: hda - change the location for one mic on a Lenovo machine
(bsc#1031717).
- alsa: hda - fix headset mic detection issue on a Dell machine
(bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc274
(bsc#1031717).
- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).
- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).
- alsa: hda/realtek - Add default procedure for suspend and resume state
(bsc#1031717).
- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).
- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic
(bsc#1031717).
- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).
- alsa: hda/realtek - Enable jack detection function for Intel ALC700
(bsc#1031717).
- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).
- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).
- alsa: hda/realtek - Fix headset and mic on several Asus laptops with
ALC256 (bsc#1031717).
- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV
(bsc#1031717).
- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255
(bsc#1031717).
- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).
- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE
(bsc#1031717).
- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).
- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).
- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289
(bsc#1031717).
- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).
- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).
- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).
- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294
(bsc#1031717).
- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294
(bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).
- alsa: hda/realtek - change the location for one of two front microphones
(bsc#1031717).
- alsa: hda/realtek - fix headset mic detection for MSI MS-B120
(bsc#1031717).
- alsa: hda: Drop useless WARN_ON() (bsc#1031717).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops
(bsc#1031717).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder
(bsc#1031717).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops
(bsc#1031717).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).
- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).
- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).
- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).
- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).
- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).
- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU
(bsc#1031717).
- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).
- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).
- arm64: Add hypervisor safe helper for checking constant capabilities
(bsc#1068032).
- arm64: Add macros to read/write system registers (bsc#1068032).
- arm64: Add skeleton to harden the branch predictor against aliasing
attacks (bsc#1068032).
- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).
- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).
- arm64: Disable kpti for non broadcast TLB HW (bsc#1068032).
- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros
(bsc#1068032).
- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm
macro (bsc#1068032).
- arm64: Fix circular include of asm/lse.h through linux/jump_label.h
(bsc#1068032).
- arm64: Fix compilation (bsc#1068032).
- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).
- arm64: Implement branch predictor hardening for affected Cortex-A CPUs
(bsc#1068032).
- arm64: Initialise high_memory global variable earlier (bnc#1012382).
- arm64: Introduce uaccess_{disable,enable} functionality based on
TTBR0_EL1 (bsc#1068032).
- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).
- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).
- arm64: Mask all exceptions during kernel_exit (bsc#1068032).
- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).
- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).
- arm64: Move the async/fiq helpers to explicitly set process context
flags (bsc#1068032).
- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to
init_mm (bsc#1068032).
- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).
- arm64: Store struct thread_info in sp_el0 (bsc#1068032).
- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).
- arm64: Use static keys for CPU features (bsc#1068032).
- arm64: add macro to extract ESR_ELx.EC (bsc#1068032).
- arm64: alternative: add auto-nop infrastructure (bsc#1068032).
- arm64: barriers: introduce nops and __nops macros for NOP sequences
(bsc#1068032).
- arm64: cpu_errata: Allow an erratum to be match for all revisions of a
core (bsc#1068032).
- arm64: cpufeature: Add scope for capability check (bsc#1068032).
- arm64: cpufeature: Pass capability structure to ->enable callback
(bsc#1068032).
- arm64: debug: remove unused local_dbg_{enable, disable} macros
(bsc#1068032).
- arm64: do not pull uaccess.h into *.S (bsc#1068032).
- arm64: entry.S convert el0_sync (bsc#1068032).
- arm64: entry.S: Remove disable_dbg (bsc#1068032).
- arm64: entry.S: convert el1_sync (bsc#1068032).
- arm64: entry.S: convert elX_irq (bsc#1068032).
- arm64: entry.S: move SError handling into a C function for future
expansion (bsc#1068032).
- arm64: entry: Add exception trampoline page for exceptions from EL0
(bsc#1068032).
- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
(bsc#1068032).
- arm64: entry: Explicitly pass exception level to kernel_ventry macro
(bsc#1068032).
- arm64: entry: Hook up entry trampoline to exception vectors
(bsc#1068032).
- arm64: entry: remove pointless SPSR mode check (bsc#1068032).
- arm64: explicitly mask all exceptions (bsc#1068032).
- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).
- arm64: factor out entry stack manipulation (bsc#1068032).
- arm64: factor work_pending state machine to C (bsc#1068032).
- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).
- arm64: head.S: get rid of x25 and x26 with 'global' scope (bsc#1068032).
- arm64: introduce an order for exceptions (bsc#1068032).
- arm64: introduce mov_q macro to move a constant into a 64-bit register
(bsc#1068032).
- arm64: kaslr: Put kernel vectors address in separate data page
(bsc#1068032).
- arm64: kill ESR_LNX_EXEC (bsc#1068032).
- arm64: kpti: Fix the interaction between ASID switching and software PAN
(bsc#1068032).
- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls
(bnc#1012382).
- arm64: kvm: Survive unknown traps from guests (bnc#1012382).
- arm64: kvm: Use per-CPU vector when BP hardening is enabled
(bsc#1068032).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).
- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).
- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR
(bsc#1068032).
- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI
(bsc#1068032).
- arm64: mm: Map entry trampoline into trampoline and kernel page tables
(bsc#1068032).
- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).
- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).
- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).
- arm64: mm: hardcode rodata=true (bsc#1068032).
- arm64: swp emulation: bound LL/SC retries before rescheduling
(bsc#1068032).
- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg
(bsc#1068032).
- arm64: sysreg: allow write_sysreg to use XZR (bsc#1068032).
- arm64: tlbflush.h: add __tlbi() macro (bsc#1068032).
- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
(bsc#1068032).
- arm64: use RET instruction for exiting the trampoline (bsc#1068032).
- arm64: use alternative auto-nop (bsc#1068032).
- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).
- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).
- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).
- arm: OMAP2+: Fix device node reference counts (bnc#1012382).
- arm: OMAP2+: Release device node after it is no longer needed
(bnc#1012382).
- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure
(bnc#1012382).
- arm: avoid faulting on qemu (bnc#1012382).
- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed
memory (bnc#1012382).
- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).
- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7
(bnc#1012382).
- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio
(bnc#1012382).
- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).
- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).
- arm: kprobes: Fix the return address of multiple kretprobes
(bnc#1012382).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm: kvm: Survive unknown traps from guests (bnc#1012382).
- asm-prototypes: Clear any CPP defines before declaring the functions
(git-fixes).
- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).
- asn.1: fix out-of-bounds read when parsing indefinite length item
(bnc#1012382).
- asoc: fsl_ssi: AC'97 ops need regmap, clock and cleaning up on failure
(bsc#1031717).
- asoc: twl4030: fix child-node lookup (bsc#1031717).
- asoc: wm_adsp: Fix validation of firmware and coeff lengths
(bsc#1031717).
- ath9k: fix tx99 potential info leak (bnc#1012382).
- atm: horizon: Fix irq release error (bnc#1012382).
- audit: ensure that 'audit=1' actually enables audit for PID 1
(bnc#1012382).
- axonram: Fix gendisk handling (bnc#1012382).
- backlight: pwm_bl: Fix overflow condition (bnc#1012382).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API
(bsc#1076110).
- bcache: Fix building error on MIPS (bnc#1012382).
- bcache: Remove deprecated create_workqueue (bsc#1076110).
- bcache: Remove redundant block_size assignment (bsc#1076110).
- bcache: Remove redundant parameter for cache_alloc() (bsc#1076110).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: debug: avoid accessing .bi_io_vec directly (bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment
notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bnc#1012382).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bnc#1012382).
- bcache: gc does not work when triggering by manual command (bsc#1076110,
bsc#1038078).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean
(bnc#1012382 bsc#1043652).
- bcache: partition support: add 16 minors per bcacheN device
(bsc#1076110).
- bcache: pr_err: more meaningful error message when nr_stripes is invalid
(bsc#1076110).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bnc#1012382
bsc#1043652).
- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails
(bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085,
bsc#1019784).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache: switch to using blk_queue_write_cache() (bsc#1076110).
- bcache: update bio->bi_opf bypass/writeback REQ_ flag hints
(bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: update document info (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up()
(bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- be2net: restore properly promisc mode after queues reconfiguration
(bsc#963844).
- block: export bio_free_pages to other modules (bsc#1076110).
- block: wake up all tasks blocked in get_request() (bnc#1012382).
- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).
- bnx2x: do not rollback VF MAC/VLAN filters we did not configure
(bnc#1012382).
- bnx2x: fix possible overrun of VFPF multicast addresses array
(bnc#1012382).
- bnx2x: prevent crash when accessing PTP with interface down
(bnc#1012382).
- btrfs: account for pinned bytes in should_alloc_chunk (bsc#1066842).
- btrfs: add missing memset while reading compressed inline extents
(bnc#1012382).
- btrfs: clear space cache inode generation always (bnc#1012382).
- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once
(bnc#1012382).
- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: gs_usb: fix return value of the "set_bittiming" callback
(bnc#1012382).
- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback()
(bnc#1012382).
- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: kvaser_usb: free buf in error paths (bnc#1012382).
- can: kvaser_usb: ratelimit errors if incomplete messages are received
(bnc#1012382).
- can: peak: fix potential bug in packet fragmentation (bnc#1012382).
- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).
- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- ceph: drop negative child dentries before try pruning inode's alias
(bnc#1012382).
- ceph: more accurate statfs (bsc#1077068).
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o
VPU (bnc#1012382).
- clk: mediatek: add the option for determining PLL source clock
(bnc#1012382).
- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).
- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).
- cpuidle: fix broadcast control when broadcast can not be entered
(bnc#1012382).
- cpuidle: powernv: Pass correct drv->cpumask for registration
(bnc#1012382).
- crypto: algapi - fix NULL dereference in crypto_remove_spawns()
(bnc#1012382).
- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).
- crypto: crypto4xx - increase context and scatter ring buffer elements
(bnc#1012382).
- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex
(bnc#1012382).
- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).
- crypto: n2 - cure use after free (bnc#1012382).
- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).
- crypto: s5p-sss - Fix completing crypto request in IRQ handler
(bnc#1012382).
- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).
- cxl: Check if vphb exists before iterating over AFU devices
(bsc#1066223).
- dax: Pass detailed error code from __dax_fault() (bsc#1072484).
- dccp: don't restart ccid2_hc_tx_rto_expire() if sk in closed state
(bnc#1012382).
- delay: add poll_event_interruptible (bsc#1048585).
- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).
- dm bufio: fix shrinker scans when (nr_to_scan < retain_target)
(bnc#1012382).
- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).
- dmaengine: Fix array index out of bounds warning in __get_unmap_pool()
(bnc#1012382).
- dmaengine: dmatest: move callback wait queue to thread context
(bnc#1012382).
- dmaengine: pl330: fix double lock (bnc#1012382).
- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type
(bnc#1012382).
- drivers/firmware: Expose psci_get_version through psci_ops structure
(bsc#1068032).
- drivers/md/bcache/util.h: remove duplicate inclusion of blkdev.h
(bsc#1076110).
- drivers: base: cacheinfo: fix boot error message when acpi is enabled
(bnc#1012382).
- drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bnc#1012382).
- drivers: net: xgene: Fix hardware checksum setting (bsc#1078526).
- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).
- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement
(bnc#1012382).
- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU
(bnc#1012382).
- drm/omap: fix dmabuf mmap for dma_alloc'ed buffers (bnc#1012382).
- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).
- drm/radeon: fix atombios on big endian (bnc#1012382).
- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).
- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).
- drm: extra printk() wrapper macros (bnc#1012382).
- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE
instead of 0 (bnc#1012382).
- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).
- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).
- edac, sb_edac: Fix missing break in switch (bnc#1012382).
- eeprom: at24: check at24_read/write arguments (bnc#1012382).
- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).
- efi: Move some sysfs files to be read-only by root (bnc#1012382).
- eventpoll.h: add missing epoll event masks (bnc#1012382).
- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).
- ext4: fix crash when a directory's i_size is too small (bnc#1012382).
- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).
- fbdev: controlfb: Add missing modes to fix out of bounds access
(bnc#1012382).
- fjes: Fix wrong netdevice feature flags (bnc#1012382).
- flow_dissector: properly cap thoff field (bnc#1012382).
- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).
- fork: clear thread stack upon allocation (bsc#1077560). Conflicts:
series.conf
- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).
- futex: Prevent overflow by strengthen input validation (bnc#1012382).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- gfs2: Take inode off order_write list when setting jdata flag
(bnc#1012382).
- gpio: altera: Use handle_level_irq when configured as a level_high
(bnc#1012382).
- hid: chicony: Add support for another ASUS Zen AiO keyboard
(bnc#1012382).
- hid: xinmo: fix for out of range for THT 2P arcade controller
(bnc#1012382).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).
- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).
- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).
- i40e: Do not enable NAPI on q_vectors that have no rings (bnc#1012382).
- ib/hfi1: Correct defered count after processing qp_wait_list (git-fixes).
- ib/hfi1: Fix rnr_timer addition (git-fixes).
- ib/hfi1: Handle kzalloc failure in init_pervl_scs (git-fixes).
- ib/hfi1: Move iowait_init() to priv allocate (git-fixes).
- ib/hfi1: Prevent kernel QP post send hard lockups (git-fixes).
- ib/hfi1: Reset QSFP on every run through channel tuning (git-fixes).
- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush
(git-fixes).
- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop
(bnc#1012382).
- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).
- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).
- ib/qib: Remove qpt_mask global (git-fixes).
- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (git-fixes).
- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).
- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).
- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).
- ibmvnic: Fix IP offload control buffer (bsc#1076899).
- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).
- ibmvnic: Fix pending MAC address changes (bsc#1075627).
- ibmvnic: Modify buffer size and number of queues on failover
(bsc#1076872).
- ibmvnic: Revert to previous mtu when unsupported value requested
(bsc#1076872).
- ibmvnic: Wait for device response when changing MAC (bsc#1078681).
- igb: check memory allocation failure (bnc#1012382).
- ima: fix hash algorithm initialization (bnc#1012382).
- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).
- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).
- input: elantech - add new icbody type 15 (bnc#1012382).
- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list
(bnc#1012382).
- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).
- input: twl6040-vibra - fix DT node memory management (bnc#1012382).
- input: twl6040-vibra - fix child-node lookup (bnc#1012382).
- intel_th: pci: Add Gemini Lake support (bnc#1012382).
- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).
- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).
- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).
- ipmi: Stop timers before cleaning up the module (bnc#1012382).
- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be
INADDR_ANY (bnc#1012382).
- ipv4: igmp: guard against silly MTU values (bnc#1012382).
- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL
(bnc#1012382).
- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).
- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).
- ipv6: mcast: better catch silly mtu values (bnc#1012382).
- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).
- ipvlan: fix ipv6 outbound device (bnc#1012382).
- ipvlan: remove excessive packet scrubbing (bsc#1070799).
- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).
- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).
- iscsi-target: Make TASK_REASSIGN use proper se_cmd->cmd_kref
(bnc#1012382).
- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).
- isdn: kcapi: avoid uninitialized data (bnc#1012382).
- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).
- ixgbe: fix use of uninitialized padding (bnc#1012382).
- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).
- jump_label: Make it possible for arches to invoke jump_label_init()
earlier (bsc#1068032).
- jump_labels: Allow array initialisers (bsc#1068032).
- kABI: protect struct bpf_map (kabi).
- kABI: protect struct ipv6_pinfo (kabi).
- kABI: protect struct t10_alua_tg_pt_gp (kabi).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi/severities: do not care about stuff_RSB
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kbuild: add '-fno-stack-check' to kernel build options (bnc#1012382).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621
bsc#1068032).
- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).
- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).
- kernel/acct.c: fix the acct->needcheck check in check_free_space()
(bnc#1012382).
- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from
!sig_kernel_only() signals (bnc#1012382).
- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL
(bnc#1012382).
- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in
complete_signal() (bnc#1012382).
- kernel: make groups_sort calling a responsibility group_info allocators
(bnc#1012382).
- keys: add missing permission check for request_key() destination
(bnc#1012382).
- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).
- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).
- kpti: Report when enabled (bnc#1012382).
- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).
- kvm: VMX: Fix enable VPID conditions (bnc#1012382).
- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).
- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).
- kvm: arm/arm64: Fix occasional warning from the timer work function
(bnc#1012382 bsc#988524).
- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).
- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset
(bnc#1012382).
- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables
(bnc#1012382).
- kvm: s390: wire up bpb feature (bsc#1076806).
- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382).
- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).
- kvm: x86: Exit to user-mode on #UD intercept when emulator requires
(bnc#1012382).
- kvm: x86: correct async page present tracepoint (bnc#1012382).
- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).
- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).
- kvm: x86: pvclock: Handle first-time write to pvclock-page contains
random junk (bnc#1012382).
- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).
- lan78xx: Fix failure in USB Full Speed (bnc#1012382).
- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).
- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
(bnc#1012382).
- libata: drop WARN from protocol error in ata_sff_qc_issue()
(bnc#1012382).
- macvlan: Only deliver one copy of the frame to the macvlan interface
(bnc#1012382).
- md-cluster: free md_cluster_info if node leave cluster (bnc#1012382).
- media: dvb: i2c transfers over usb cannot be done from stack
(bnc#1012382).
- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).
- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).
- mfd: twl6040: Fix child-node lookup (bnc#1012382).
- mlxsw: reg: Fix SPVM max record count (bnc#1012382).
- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
(bnc#1012382).
- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP
(bnc#1012382).
- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).
- mm: Introduce lm_alias (bsc#1068032).
- mm: avoid returning VM_FAULT_RETRY from ->page_mkwrite handlers
(bnc#1012382).
- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).
- mmc: core: Do not leave the block driver in a suspended state
(bnc#1012382).
- mmc: mediatek: Fixed bug where clock frequency could be set wrong
(bnc#1012382).
- module: set __jump_table alignment to 8 (bnc#1012382).
- more bio_map_user_iov() leak fixes (bnc#1012382).
- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
(bnc#1012382).
- net/appletalk: Fix kernel memory disclosure (bnc#1012382).
- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y
(bnc#1012382).
- net/packet: fix a race in packet_bind() and packet_notifier()
(bnc#1012382).
- net: Allow neigh contructor functions ability to modify the primary_key
(bnc#1012382).
- net: Do not allow negative values for busy_read and busy_poll sysctl
interfaces (bnc#1012382).
- net: Fix double free and memory corruption in get_net_ns_by_id()
(bnc#1012382).
- net: Resend IGMP memberships upon peer notification (bnc#1012382).
- net: bcmgenet: Power up the internal PHY before probing the MII
(bnc#1012382).
- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).
- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values
(bnc#1012382).
- net: bcmgenet: power down internal phy if open or resume fails
(bnc#1012382).
- net: bcmgenet: reserved phy revisions must be checked first
(bnc#1012382).
- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink
leaks (bnc#1012382).
- net: core: fix module type in sock_diag_bind (bnc#1012382).
- net: fec: fix multicast filtering hardware setup (bnc#1012382).
- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).
- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).
- net: initialize msg.msg_flags in recvfrom (bnc#1012382).
- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).
- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).
- net: mvneta: clear interface link status on port disable (bnc#1012382).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).
- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg
workaround (bnc#1012382).
- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).
- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4
(bnc#1012382).
- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).
- net: reevalulate autoflowlabel setting after sysctl setting
(bnc#1012382).
- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).
- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).
- net: systemport: Pad packet before inserting TSB (bnc#1012382).
- net: systemport: Utilize skb_put_padto() (bnc#1012382).
- net: tcp: close sock if net namespace is exiting (bnc#1012382).
- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).
- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).
- netfilter: do not track fragmented packets (bnc#1012382).
- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).
- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).
- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).
- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).
- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash
table (bnc#1012382).
- netfilter: nfnl_cthelper: fix runtime expectation policy updates
(bnc#1012382).
- netlink: add a start callback for starting a netlink dump (bnc#1012382).
- nfs: Do not take a reference on fl->fl_file for LOCK operation
(bnc#1012382).
- nfs: Fix a typo in nfs_rename() (bnc#1012382).
- nfs: improve shinking of access cache (bsc#1012917).
- nfsd: Fix another OPEN stateid race (bnc#1012382).
- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).
- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).
- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).
- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).
- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).
- nfsv4.1 respect server's max size in CREATE_SESSION (bnc#1012382).
- nfsv4: Fix client recovery when server reboots multiple times
(bnc#1012382).
- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick()
(bnc#1012382).
- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).
- packet: fix crash in fanout_demux_rollover() (bnc#1012382).
- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel
(bnc#1012382).
- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).
- partially revert tipc improve link resiliency when rps is activated
(bsc#1068038).
- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).
- pci/AER: Report non-fatal errors only to the affected endpoint
(bnc#1012382).
- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).
- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).
- pci: Create SR-IOV virtfn/physfn links before attaching driver
(bnc#1012382).
- pci: Detach driver before procfs & sysfs teardown on device remove
(bnc#1012382).
- perf symbols: Fix symbols__fixup_end heuristic for corner cases
(bnc#1012382).
- perf test attr: Fix ignored test case result (bnc#1012382).
- perf: xgene: Add support for SoC PMU version 3 (bsc#1076809).
- perf: xgene: Include module.h (bsc#1076809).
- perf: xgene: Move PMU leaf functions into function pointer structure
(bsc#1076809).
- perf: xgene: Parse PMU subnode from the match table (bsc#1076809).
- perf: xgene: Remove unnecessary managed resources cleanup (bsc#1076809).
- phy: work around 'phys' references to usb-nop-xceiv devices
(bnc#1012382).
- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).
- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).
- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid
(bsc#1068032, bsc#1075087).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas
(bsc#1068032, bsc#1075087).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032,
bsc#1075087).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,
bsc#1075087).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti
(bsc#1068032, bsc#1075087).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032,
bsc#1075087).
- powerpc/ipic: Fix status get and status clear (bnc#1012382).
- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).
- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).
- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo
(bnc#1012382).
- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested
(bnc#1012382).
- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032,
bsc#1075087).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration
(bsc#1068032, bsc#1075087).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032,
bsc#1075087).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,
bsc#1075087).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032,
bsc#1075087).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,
bsc#1075087).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032,
bsc#1075087).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI)
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: prevent crash when changing flush type to fallback
after system boot (bsc#1068032, bsc#1075087).
- ppp: Destroy the mutex when cleanup (bnc#1012382).
- pppoe: take ->needed_headroom of lower device into account on xmit
(bnc#1012382).
- pti: unbreak EFI (bsc#1074709).
- r8152: fix the list rx_done may be used without initialization
(bnc#1012382).
- r8152: prevent the driver from transmitting packets with carrier off
(bnc#1012382).
- r8169: fix memory corruption on retrieval of hardware statistics
(bnc#1012382).
- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).
- ravb: Remove Rx overflow log messages (bnc#1012382).
- rbd: set max_segments to USHRT_MAX (bnc#1012382).
- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).
- rdma/iser: Fix possible mr leak on device removal event (bnc#1012382).
- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).
- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).
- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).
- regulator: Try to resolve regulators supplies on registration
(bsc#1074847).
- regulator: core: Rely on regulator_dev_release to free constraints
(bsc#1074847).
- regulator: da9063: Return an error code on probe failure (bsc#1074847).
- regulator: pwm: Fix regulator ramp delay for continuous mode
(bsc#1074847).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).
- ring-buffer: Mask out the info bits when returning buffer page length
(bnc#1012382).
- route: also update fnhe_genid when updating a route cache (bnc#1012382).
- route: update fnhe_expires for redirect when the fnhe exists
(bnc#1012382).
- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).
- rtc: pcf8563: fix output clock rate (bnc#1012382).
- rtc: pl031: make interrupt optional (bnc#1012382).
- rtc: set the alarm to the next expiring timer (bnc#1012382).
- s390/pci: do not require AIS facility (bnc#1012382).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1012382).
- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).
- s390: always save and restore all registers on context switch
(bnc#1012382).
- s390: fix compat system call table (bnc#1012382).
- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).
- sched/deadline: Make sure the replenishment timer fires in the next
period (bnc#1012382).
- sched/deadline: Throttle a constrained deadline task activated after the
deadline (bnc#1012382).
- sched/deadline: Use deadline instead of period when calculating overflow
(bnc#1012382).
- sched/deadline: Use the revised wakeup rule for suspending constrained
dl tasks (bnc#1012382).
- sched/deadline: Zero out positive runtime after throttling constrained
tasks (git-fixes).
- sched/rt: Do not pull from current CPU if only one CPU to pull
(bnc#1022476).
- scsi: bfa: integer overflow in debugfs (bnc#1012382).
- scsi: check for device state in __scsi_remove_target() (bsc#1072589).
- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).
- scsi: fixup kernel warning during rmmod() (bsc#1052360).
- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading
(bnc#1012382).
- scsi: hpsa: destroy sas transport properties before scsi_host
(bnc#1012382).
- scsi: libsas: align sata_device's rps_resp on a cacheline (bnc#1012382).
- scsi: lpfc: Fix PT2PT PRLI reject (bnc#1012382).
- scsi: lpfc: Fix crash during Hardware error recovery on SLI3 adapters
(bnc#1012382).
- scsi: lpfc: Fix secure firmware updates (bnc#1012382).
- scsi: lpfc: PLOGI failures during NPIV testing (bnc#1012382).
- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1
volume created on two SATA drive (bnc#1012382).
- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).
- scsi: sd: change manage_start_stop to bool in sysfs interface
(bnc#1012382).
- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- sctp: Replace use of sockets_allocated with specified macro
(bnc#1012382).
- sctp: do not allow the v4 socket to bind a v4mapped v6 address
(bnc#1012382).
- sctp: do not free asoc when it is already dead in sctp_sendmsg
(bnc#1012382).
- sctp: return error if the asoc has been peeled off in
sctp_wait_for_sndbuf (bnc#1012382).
- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).
- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).
- selftests/x86/ldt_get: Add a few additional tests for limits
(bnc#1012382).
- selftests/x86: Add test_vsyscall (bnc#1012382).
- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).
- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).
- series.conf: fix wrong bsc reference
- series.conf: whitespace cleanup
- sfc: do not warn on successful change of MAC (bnc#1012382).
- sh_eth: fix SH7757 GEther initialization (bnc#1012382).
- sh_eth: fix TSU resource handling (bnc#1012382).
- sit: update frag_off info (bnc#1012382).
- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).
- sparc64/mm: set fields in deferred pages (bnc#1012382).
- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).
- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).
- spi_ks8995: fix "BUG: key accdaa28 not in .data!" (bnc#1012382).
- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
(bnc#1012382).
- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: replace generic auth_cred hash with auth-specific function
(bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- sysrq : fix Show Regs call trace on ARM (bnc#1012382).
- target/file: Do not return error for UNMAP if length is zero
(bnc#1012382).
- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd()
(bnc#1012382).
- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK
(bnc#1012382).
- target: Use system workqueue for ALUA transitions (bnc#1012382).
- target: fix ALUA transition timeout handling (bnc#1012382).
- target: fix race during implicit transition work flushes (bnc#1012382).
- target:fix condition return in core_pr_dump_initiator_port()
(bnc#1012382).
- tcp md5sig: Use skb's saddr when replying to an incoming segment
(bnc#1012382).
- tcp: __tcp_hdrlen() helper (bnc#1012382).
- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).
- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).
- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).
- thermal/drivers/step_wise: Fix temperature regulation misbehavior
(bnc#1012382).
- thermal: hisilicon: Handle return value of clk_prepare_enable
(bnc#1012382).
- tipc: fix cleanup at module unload (bnc#1012382).
- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).
- tipc: improve link resiliency when rps is activated (bsc#1068038).
- tracing: Allocate mask_str buffer dynamically (bnc#1012382).
- tracing: Fix converting enum's from the map in trace_event_eval_update()
(bnc#1012382).
- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).
- tracing: Fix possible double free on failure of allocating trace buffer
(bnc#1012382).
- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).
- tty fix oops when rmmod 8250 (bnc#1012382).
- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).
- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).
- udf: Avoid overflow when session starts at large offset (bnc#1012382).
- um: link vmlinux with -no-pie (bnc#1012382).
- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).
- usb: Fix off by one in type-specific length check of BOS SSP capability
(git-fixes).
- usb: Increase usbfs transfer limit (bnc#1012382).
- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).
- usb: core: Add type-specific length check of BOS descriptors
(bnc#1012382).
- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).
- usb: devio: Prevent integer overflow in proc_do_submiturb()
(bnc#1012382).
- usb: fix usbmon BUG trigger (bnc#1012382).
- usb: gadget: configs: plug memory leak (bnc#1012382).
- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed
(bnc#1012382).
- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping
(bnc#1012382).
- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).
- usb: gadgetfs: Fix a potential memory leak in 'dev_config()'
(bnc#1012382).
- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).
- usb: misc: usb3503: make sure reset is low for at least 100us
(bnc#1012382).
- usb: musb: da8xx: fix babble condition handling (bnc#1012382).
- usb: phy: isp1301: Add OF device ID table (bnc#1012382).
- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled
(git-fixes).
- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).
- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub
(bnc#1012382).
- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ
(bnc#1012382).
- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).
- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).
- usb: serial: option: add Quectel BG96 id (bnc#1012382).
- usb: serial: option: add support for Telit ME910 PID 0x1101
(bnc#1012382).
- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).
- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).
- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID
(bnc#1012382).
- usb: usbfs: Filter flags passed in from user space (bnc#1012382).
- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).
- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).
- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).
- usbip: Fix implicit fallthrough warning (bnc#1012382).
- usbip: Fix potential format overflow in userspace tools (bnc#1012382).
- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).
- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input
(bnc#1012382).
- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer
(bnc#1012382).
- usbip: fix usbip bind writing random string after command in match_busid
(bnc#1012382).
- usbip: prevent leaking socket pointer address in messages (bnc#1012382).
- usbip: prevent vhci_hcd driver from leaking a socket pointer address
(bnc#1012382).
- usbip: remove kernel addresses from usb device and urb debug msgs
(bnc#1012382).
- usbip: stub: stop printing kernel pointer addresses in messages
(bnc#1012382).
- usbip: vhci: stop printing kernel pointer addresses in messages
(bnc#1012382).
- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).
- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).
- video: fbdev: au1200fb: Release some resources if a memory allocation
fails (bnc#1012382).
- video: fbdev: au1200fb: Return an error code if a memory allocation
fails (bnc#1012382).
- virtio: release virtio index when fail to device_register (bnc#1012382).
- vmxnet3: repair memory leak (bnc#1012382).
- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).
- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend
(bnc#1012382).
- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).
- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).
- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq
(bnc#1012382).
- writeback: fix memory leak in wb_queue_work() (bnc#1012382).
- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).
- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).
- x509: fix printing uninitialized stack memory when OID is empty
(bsc#1075078).
- x86/Documentation: Add PTI description (bnc#1012382).
- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).
- x86/acpi: Handle SCI interrupts above legacy space gracefully
(bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq()
(bsc#1068984).
- x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
(bnc#1012382).
- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).
- x86/apic/vector: Fix off by one in error path (bnc#1012382).
- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels
(bnc#1012382).
- x86/boot: Fix early command-line parsing when matching at end
(bsc#1068032).
- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).
- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/efi-bgrt: Fix kernel panic when mapping BGRT data (bnc#1012382).
- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).
- x86/efi: Build our own page table structures (bnc#1012382).
- x86/efi: Hoist page table switching code into efi_call_virt()
(bnc#1012382).
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
(bnc#1012382).
- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).
- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).
- x86/kasan: Write protect kasan zero shadow (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check
(bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading with a revision check
(bnc#1012382).
- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).
- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
(git-fixes).
- x86/mm/pat: Ensure cpa->pfn only contains page frame numbers
(bnc#1012382).
- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).
- x86/pti/efi: broken conversion from efi to kernel page table
(bnc#1012382).
- x86/pti: Document fix wrong index (bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active
(bsc#1068032).
- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994
bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).
- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly()
(bnc#1012382).
- xen-netfront: Improve error handling during initialization (bnc#1012382).
- xen-netfront: avoid crashing on resume after a failure in
talk_to_netback() (bnc#1012382).
- xfrm: Copy policy family in clone_policy (bnc#1012382).
- xfs: Add infrastructure needed for error propagation during buffer IO
failure (bsc#1068569).
- xfs: Properly retry failed inode items in case of error during buffer
writeback (bsc#1068569).
- xfs: add "fail at unmount" error handling configuration (bsc#1068569).
- xfs: add configurable error support to metadata buffers (bsc#1068569).
- xfs: add configuration handlers for specific errors (bsc#1068569).
- xfs: add configuration of error failure speed (bsc#1068569).
- xfs: address kabi for xfs buffer retry infrastructure (kabi).
- xfs: configurable error behavior via sysfs (bsc#1068569).
- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real
(bnc#1012382).
- xfs: fix log block underflow during recovery cycle verification
(bnc#1012382).
- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).
- xfs: introduce metadata IO error class (bsc#1068569).
- xfs: introduce table-based init for error behaviors (bsc#1068569).
- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).
- xhci: Do not add a virt_dev to the devs array before it's fully
allocated (bnc#1012382).
- xhci: Fix ring leak in failure path of xhci_alloc_virt_device()
(bnc#1012382).
- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).
- zram: set physical queue limits to avoid array out of bounds accesses
(bnc#1012382).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2018-285=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-285=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-285=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-285=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2018-285=1
- SUSE Linux Enterprise High Availability 12-SP2:
zypper in -t patch SUSE-SLE-HA-12-SP2-2018-285=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-285=1
- OpenStack Cloud Magnum Orchestration 7:
zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-285=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
kernel-default-debuginfo-4.4.114-92.64.1
kernel-default-debugsource-4.4.114-92.64.1
kernel-default-extra-4.4.114-92.64.1
kernel-default-extra-debuginfo-4.4.114-92.64.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
kernel-obs-build-4.4.114-92.64.1
kernel-obs-build-debugsource-4.4.114-92.64.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):
kernel-docs-4.4.114-92.64.2
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
kernel-default-4.4.114-92.64.1
kernel-default-base-4.4.114-92.64.1
kernel-default-base-debuginfo-4.4.114-92.64.1
kernel-default-debuginfo-4.4.114-92.64.1
kernel-default-debugsource-4.4.114-92.64.1
kernel-default-devel-4.4.114-92.64.1
kernel-syms-4.4.114-92.64.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
kernel-devel-4.4.114-92.64.1
kernel-macros-4.4.114-92.64.1
kernel-source-4.4.114-92.64.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
kernel-default-4.4.114-92.64.1
kernel-default-base-4.4.114-92.64.1
kernel-default-base-debuginfo-4.4.114-92.64.1
kernel-default-debuginfo-4.4.114-92.64.1
kernel-default-debugsource-4.4.114-92.64.1
kernel-default-devel-4.4.114-92.64.1
kernel-syms-4.4.114-92.64.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
kernel-devel-4.4.114-92.64.1
kernel-macros-4.4.114-92.64.1
kernel-source-4.4.114-92.64.1
- SUSE Linux Enterprise Server 12-SP2 (s390x):
kernel-default-man-4.4.114-92.64.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_114-92_64-default-1-3.3.2
- SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.4.114-92.64.1
cluster-md-kmp-default-debuginfo-4.4.114-92.64.1
cluster-network-kmp-default-4.4.114-92.64.1
cluster-network-kmp-default-debuginfo-4.4.114-92.64.1
dlm-kmp-default-4.4.114-92.64.1
dlm-kmp-default-debuginfo-4.4.114-92.64.1
gfs2-kmp-default-4.4.114-92.64.1
gfs2-kmp-default-debuginfo-4.4.114-92.64.1
kernel-default-debuginfo-4.4.114-92.64.1
kernel-default-debugsource-4.4.114-92.64.1
ocfs2-kmp-default-4.4.114-92.64.1
ocfs2-kmp-default-debuginfo-4.4.114-92.64.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
kernel-default-4.4.114-92.64.1
kernel-default-debuginfo-4.4.114-92.64.1
kernel-default-debugsource-4.4.114-92.64.1
kernel-default-devel-4.4.114-92.64.1
kernel-default-extra-4.4.114-92.64.1
kernel-default-extra-debuginfo-4.4.114-92.64.1
kernel-syms-4.4.114-92.64.1
- SUSE Linux Enterprise Desktop 12-SP2 (noarch):
kernel-devel-4.4.114-92.64.1
kernel-macros-4.4.114-92.64.1
kernel-source-4.4.114-92.64.1
- OpenStack Cloud Magnum Orchestration 7 (x86_64):
kernel-default-4.4.114-92.64.1
kernel-default-debuginfo-4.4.114-92.64.1
kernel-default-debugsource-4.4.114-92.64.1
References:
https://www.suse.com/security/cve/CVE-2017-15129.html
https://www.suse.com/security/cve/CVE-2017-17712.html
https://www.suse.com/security/cve/CVE-2017-17862.html
https://www.suse.com/security/cve/CVE-2017-17864.html
https://www.suse.com/security/cve/CVE-2017-18017.html
https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-5332.html
https://www.suse.com/security/cve/CVE-2018-5333.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1012917
https://bugzilla.suse.com/1019784
https://bugzilla.suse.com/1022476
https://bugzilla.suse.com/1031717
https://bugzilla.suse.com/1038078
https://bugzilla.suse.com/1038085
https://bugzilla.suse.com/1043652
https://bugzilla.suse.com/1048585
https://bugzilla.suse.com/1052360
https://bugzilla.suse.com/1060279
https://bugzilla.suse.com/1066223
https://bugzilla.suse.com/1066842
https://bugzilla.suse.com/1068032
https://bugzilla.suse.com/1068038
https://bugzilla.suse.com/1068569
https://bugzilla.suse.com/1068984
https://bugzilla.suse.com/1069160
https://bugzilla.suse.com/1070799
https://bugzilla.suse.com/1072163
https://bugzilla.suse.com/1072484
https://bugzilla.suse.com/1072589
https://bugzilla.suse.com/1073229
https://bugzilla.suse.com/1073928
https://bugzilla.suse.com/1074134
https://bugzilla.suse.com/1074392
https://bugzilla.suse.com/1074488
https://bugzilla.suse.com/1074621
https://bugzilla.suse.com/1074709
https://bugzilla.suse.com/1074839
https://bugzilla.suse.com/1074847
https://bugzilla.suse.com/1075066
https://bugzilla.suse.com/1075078
https://bugzilla.suse.com/1075087
https://bugzilla.suse.com/1075091
https://bugzilla.suse.com/1075428
https://bugzilla.suse.com/1075617
https://bugzilla.suse.com/1075621
https://bugzilla.suse.com/1075627
https://bugzilla.suse.com/1075994
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1076110
https://bugzilla.suse.com/1076806
https://bugzilla.suse.com/1076809
https://bugzilla.suse.com/1076872
https://bugzilla.suse.com/1076899
https://bugzilla.suse.com/1077068
https://bugzilla.suse.com/1077560
https://bugzilla.suse.com/1077592
https://bugzilla.suse.com/1078526
https://bugzilla.suse.com/1078681
https://bugzilla.suse.com/963844
https://bugzilla.suse.com/988524
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0414-1: important: Security update for freetype2
by opensuse-security@opensuse.org 09 Feb '18
by opensuse-security@opensuse.org 09 Feb '18
09 Feb '18
SUSE Security Update: Security update for freetype2
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0414-1
Rating: important
References: #1028103 #1035807 #1036457 #1079600
Cross-References: CVE-2016-10244 CVE-2017-7864 CVE-2017-8105
CVE-2017-8287
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
SUSE CaaS Platform ALL
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for freetype2 fixes the following security issues:
- CVE-2016-10244: Make sure that the parse_charstrings function in
type1/t1load.c does ensure that a font contains a glyph name to prevent
a DoS through a heap-based buffer over-read or possibly have unspecified
other impact via a crafted file (bsc#1028103)
- CVE-2017-8105: Fix an out-of-bounds write caused by a heap-based buffer
overflow related to the t1_decoder_parse_charstrings function in
psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
overflow related to the t1_builder_close_contour function in
psaux/psobjs.c (bsc#1036457)
- Fix several integer overflow issues in truetype/ttinterp.c (bsc#1079600)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-286=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-286=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-286=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-286=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-286=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-286=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-286=1
- SUSE CaaS Platform ALL:
zypper in -t patch SUSE-CAASP-ALL-2018-286=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
freetype2-debugsource-2.6.3-7.15.1
freetype2-devel-2.6.3-7.15.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
freetype2-debugsource-2.6.3-7.15.1
freetype2-devel-2.6.3-7.15.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
freetype2-debugsource-2.6.3-7.15.1
ft2demos-2.6.3-7.15.1
libfreetype6-2.6.3-7.15.1
libfreetype6-debuginfo-2.6.3-7.15.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
freetype2-debugsource-2.6.3-7.15.1
ft2demos-2.6.3-7.15.1
libfreetype6-2.6.3-7.15.1
libfreetype6-debuginfo-2.6.3-7.15.1
- SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):
libfreetype6-32bit-2.6.3-7.15.1
libfreetype6-debuginfo-32bit-2.6.3-7.15.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
freetype2-debugsource-2.6.3-7.15.1
ft2demos-2.6.3-7.15.1
libfreetype6-2.6.3-7.15.1
libfreetype6-debuginfo-2.6.3-7.15.1
- SUSE Linux Enterprise Server 12-SP2 (s390x x86_64):
libfreetype6-32bit-2.6.3-7.15.1
libfreetype6-debuginfo-32bit-2.6.3-7.15.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
freetype2-debugsource-2.6.3-7.15.1
ft2demos-2.6.3-7.15.1
libfreetype6-2.6.3-7.15.1
libfreetype6-32bit-2.6.3-7.15.1
libfreetype6-debuginfo-2.6.3-7.15.1
libfreetype6-debuginfo-32bit-2.6.3-7.15.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
freetype2-debugsource-2.6.3-7.15.1
ft2demos-2.6.3-7.15.1
libfreetype6-2.6.3-7.15.1
libfreetype6-32bit-2.6.3-7.15.1
libfreetype6-debuginfo-2.6.3-7.15.1
libfreetype6-debuginfo-32bit-2.6.3-7.15.1
- SUSE CaaS Platform ALL (x86_64):
freetype2-debugsource-2.6.3-7.15.1
libfreetype6-2.6.3-7.15.1
libfreetype6-debuginfo-2.6.3-7.15.1
References:
https://www.suse.com/security/cve/CVE-2016-10244.html
https://www.suse.com/security/cve/CVE-2017-7864.html
https://www.suse.com/security/cve/CVE-2017-8105.html
https://www.suse.com/security/cve/CVE-2017-8287.html
https://bugzilla.suse.com/1028103
https://bugzilla.suse.com/1035807
https://bugzilla.suse.com/1036457
https://bugzilla.suse.com/1079600
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2018:0408-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 09 Feb '18
by opensuse-security@opensuse.org 09 Feb '18
09 Feb '18
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0408-1
Rating: important
References: #1012382 #1015342 #1015343 #1019784 #1022595
#1022912 #1024296 #1024376 #1031492 #1031717
#1037838 #1038078 #1038085 #1040182 #1043652
#1048325 #1048585 #1053472 #1060279 #1062129
#1066163 #1066223 #1068032 #1068038 #1068569
#1068984 #1069138 #1069160 #1070052 #1070799
#1072163 #1072484 #1073229 #1073230 #1073928
#1074134 #1074488 #1074621 #1074709 #1074839
#1074847 #1075066 #1075078 #1075087 #1075091
#1075397 #1075428 #1075617 #1075621 #1075627
#1075811 #1075994 #1076017 #1076110 #1076187
#1076232 #1076805 #1076847 #1076872 #1076899
#1077068 #1077513 #1077560 #1077592 #1077704
#1077779 #1077871 #1078002 #1078681 #1078787
#1079038 #1079195 #963844 #966170 #966172
#969476 #969477 #973818 #985025
Cross-References: CVE-2017-15129 CVE-2017-17712 CVE-2017-17862
CVE-2017-17864 CVE-2017-18017 CVE-2017-5715
CVE-2018-1000004 CVE-2018-5332 CVE-2018-5333
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves 9 vulnerabilities and has 70 fixes is
now available.
Description:
The openSUSE Leap 42.3 kernel was updated to 4.4.114 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized
disclosure
of information to an attacker with local user access via a side-channel
analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building
the Linux Kernel with return trampolines aka "retpolines".
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
net/rds/rdma.c mishandled cases where page pinning fails or an invalid
address is supplied, leading to an rds_atomic_free_op NULL pointer
dereference (bnc#1075617).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
did not validate a value that is used during DMA page allocation,
leading to a heap-based out-of-bounds write (related to the
rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores
unreachable code, even though it would still be processed by JIT
compilers. This behavior, also considered an improper branch-pruning
logic issue, could possibly be used by local users for denial of service
(bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled
states_equal comparisons between the pointer data type and the
UNKNOWN_VALUE data type, which allowed local users to obtain potentially
sensitive address information, aka a "pointer leak (bnc#1073928).
- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the
Linux kernel had a race condition in inet->hdrincl that lead to
uninitialized stack pointer usage; this allowed a local user to execute
code and gain privileges (bnc#1073229 1073230).
- CVE-2017-15129: A use-after-free vulnerability was found in network
namespaces code affecting the Linux kernel The function
get_net_ns_by_id() in net/core/net_namespace.c did not check for the
net::count value after it has found a peer network in netns_ids idr,
which could lead to double free and memory corruption. This
vulnerability could allow an unprivileged local user to induce kernel
memory corruption on the system, leading to a crash. Due to the nature
of the flaw, privilege escalation cannot be fully ruled out, although it
is thought to be unlikely (bnc#1074839).
- CVE-2017-18017: The tcpmss_mangle_packet function in
net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
to cause a denial of service (use-after-free and memory corruption)
or possibly have unspecified other impact by leveraging the presence of
xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2018-1000004: In the Linux kernel versions a race condition
vulnerability existed in the sound system, this can lead to a deadlock
and denial of service condition (bnc#1076017).
The following non-security bugs were fixed:
- 509: fix printing uninitialized stack memory when OID is empty
(bsc#1075078).
- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).
- acpi / scan: Prefer devices without _HID/_CID for _ADR matching
(bnc#1012382).
- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).
- af_key: fix buffer overread in verify_address_len() (bnc#1012382).
- afs: Adjust mode bits processing (bnc#1012382).
- afs: Connect up the CB.ProbeUuid (bnc#1012382).
- afs: Fix afs_kill_pages() (bnc#1012382).
- afs: Fix missing put_page() (bnc#1012382).
- afs: Fix page leak in afs_write_begin() (bnc#1012382).
- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).
- afs: Flush outstanding writes when an fd is closed (bnc#1012382).
- afs: Migrate vlocation fields to 64-bit (bnc#1012382).
- afs: Populate and use client modification time (bnc#1012382).
- afs: Populate group ID from vnode status (bnc#1012382).
- afs: Prevent callback expiry timer overflow (bnc#1012382).
- alpha: fix build failures (bnc#1012382).
- alsa: aloop: Fix inconsistent format due to incomplete rule
(bsc#1031717).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).
- alsa: aloop: Release cable upon open error path (bsc#1031717).
- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant
(bsc#1031717).
- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops
(bsc#1031717).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder
(bsc#1031717).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops
(bsc#1031717).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).
- arc: uaccess: dont use "l" gcc inline asm constraint modifier
(bnc#1012382).
- arm64: Add skeleton to harden the branch predictor against aliasing
attacks (bsc#1068032).
- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).
- arm64: Branch predictor hardening for Cavium ThunderX2 (bsc#1068032).
- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).
- arm64: cpufeature: Pass capability structure to ->enable callback
(bsc#1068032).
- arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs (bsc#1068032).
- arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75
(bsc#1068032).
- arm64: debug: remove unused local_dbg_{enable, disable} macros
(bsc#1068032).
- arm64: Define cputype macros for Falkor CPU (bsc#1068032).
- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).
- arm64: Do not force KPTI for CPUs that are not vulnerable (bsc#1076187).
- arm64: do not pull uaccess.h into *.S (bsc#1068032).
- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: entry: Add exception trampoline page for exceptions from EL0
(bsc#1068032).
- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
(bsc#1068032).
- arm64: entry: Explicitly pass exception level to kernel_ventry macro
(bsc#1068032).
- arm64: entry: Hook up entry trampoline to exception vectors
(bsc#1068032).
- arm64: entry: remove pointless SPSR mode check (bsc#1068032).
- arm64: entry.S convert el0_sync (bsc#1068032).
- arm64: entry.S: convert el1_sync (bsc#1068032).
- arm64: entry.S: convert elX_irq (bsc#1068032).
- arm64: entry.S: move SError handling into a C function for future
expansion (bsc#1068032).
- arm64: entry.S: Remove disable_dbg (bsc#1068032).
- arm64: erratum: Work around Falkor erratum #E1003 in trampoline code
(bsc#1068032).
- arm64: explicitly mask all exceptions (bsc#1068032).
- arm64: factor out entry stack manipulation (bsc#1068032).
- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).
- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros
(bsc#1068032).
- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm
macro (bsc#1068032).
- arm64: factor work_pending state machine to C (bsc#1068032).
- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).
- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).
- arm64: Handle faults caused by inadvertent user access with PAN enabled
(bsc#1068032).
- arm64: head.S: get rid of x25 and x26 with 'global' scope (bsc#1068032).
- arm64: Implement branch predictor hardening for affected Cortex-A CPUs
(bsc#1068032).
- arm64: Implement branch predictor hardening for Falkor (bsc#1068032).
- arm64: Initialise high_memory global variable earlier (bnc#1012382).
- arm64: introduce an order for exceptions (bsc#1068032).
- arm64: introduce mov_q macro to move a constant into a 64-bit register
(bsc#1068032).
- arm64: Introduce uaccess_{disable,enable} functionality based on
TTBR0_EL1 (bsc#1068032).
- arm64: kaslr: Put kernel vectors address in separate data page
(bsc#1068032).
- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).
- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).
- arm64: kill ESR_LNX_EXEC (bsc#1068032).
- arm64: kpti: Fix the interaction between ASID switching and software PAN
(bsc#1068032).
- arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls
(bsc#1076232).
- arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm64: KVM: Make PSCI_VERSION a fast path (bsc#1068032).
- arm64: KVM: Use per-CPU vector when BP hardening is enabled
(bsc#1068032).
- arm64: Mask all exceptions during kernel_exit (bsc#1068032).
- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).
- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).
- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: hardcode rodata=true (bsc#1068032).
- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR
(bsc#1068032).
- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI
(bsc#1068032).
- arm64: mm: Map entry trampoline into trampoline and kernel page tables
(bsc#1068032).
- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).
- arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003
(bsc#1068032).
- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).
- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).
- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).
- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).
- arm64: Move the async/fiq helpers to explicitly set process context
flags (bsc#1068032).
- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to
init_mm (bsc#1068032).
- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).
- arm64: swp emulation: bound LL/SC retries before rescheduling
(bsc#1068032).
- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg
(bsc#1068032).
- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).
- arm64: thunderx2: remove branch predictor hardening References:
bsc#1076232 This causes undefined instruction abort on the smc call from
guest kernel. Disable until kvm is fixed.
- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
(bsc#1068032).
- arm64: Turn on KPTI only on CPUs that need it (bsc#1076187).
- arm64: use alternative auto-nop (bsc#1068032).
- arm64: use RET instruction for exiting the trampoline (bsc#1068032).
- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).
- arm/arm64: KVM: Make default HYP mappings non-excutable (bsc#1068032).
- arm: avoid faulting on qemu (bnc#1012382).
- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).
- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).
- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed
memory (bnc#1012382).
- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).
- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7
(bnc#1012382).
- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).
- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).
- arm: kprobes: Fix the return address of multiple kretprobes
(bnc#1012382).
- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).
- arm: OMAP2+: Fix device node reference counts (bnc#1012382).
- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure
(bnc#1012382).
- arm: OMAP2+: Release device node after it is no longer needed
(bnc#1012382).
- asm-prototypes: Clear any CPP defines before declaring the functions
(git-fixes).
- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).
- asn.1: fix out-of-bounds read when parsing indefinite length item
(bnc#1012382).
- ath9k: fix tx99 potential info leak (bnc#1012382).
- atm: horizon: Fix irq release error (bnc#1012382).
- audit: ensure that 'audit=1' actually enables audit for PID 1
(bnc#1012382).
- axonram: Fix gendisk handling (bnc#1012382).
- backlight: pwm_bl: Fix overflow condition (bnc#1012382).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: bch_allocator_thread() is not freezable (bsc#1076110).
- bcache: bch_writeback_thread() is not freezable (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment
notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API
(bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bnc#1012382).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bnc#1012382).
- bcache: gc does not work when triggering by manual command (bsc#1076110,
bsc#1038078).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean
(bnc#1012382 bsc#1043652).
- bcache: partition support: add 16 minors per bcacheN device
(bsc#1076110, bsc#1019784).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bnc#1012382
bsc#1043652).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: update bio->bi_opf bypass/writeback REQ_ flag hints
(bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up()
(bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- be2net: restore properly promisc mode after queues reconfiguration
(bsc#963844 FATE#320192).
- block: wake up all tasks blocked in get_request() (bnc#1012382).
- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).
- bnx2x: do not rollback VF MAC/VLAN filters we did not configure
(bnc#1012382).
- bnx2x: fix possible overrun of VFPF multicast addresses array
(bnc#1012382).
- bnx2x: prevent crash when accessing PTP with interface down
(bnc#1012382).
- btrfs: add missing memset while reading compressed inline extents
(bnc#1012382).
- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once
(bnc#1012382).
- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: gs_usb: fix return value of the "set_bittiming" callback
(bnc#1012382).
- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback()
(bnc#1012382).
- can: kvaser_usb: free buf in error paths (bnc#1012382).
- can: kvaser_usb: ratelimit errors if incomplete messages are received
(bnc#1012382).
- can: peak: fix potential bug in packet fragmentation (bnc#1012382).
- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).
- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- ceph: more accurate statfs (bsc#1077068).
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o
VPU (bnc#1012382).
- clk: mediatek: add the option for determining PLL source clock
(bnc#1012382).
- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).
- config: arm64: enable HARDEN_BRANCH_PREDICTOR
- config: arm64: enable UNMAP_KERNEL_AT_EL0
- cpuidle: fix broadcast control when broadcast can not be entered
(bnc#1012382).
- cpuidle: powernv: Pass correct drv->cpumask for registration
(bnc#1012382).
- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).
- crypto: algapi - fix NULL dereference in crypto_remove_spawns()
(bnc#1012382).
- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).
- crypto: chelsio - select CRYPTO_GF128MUL (bsc#1048325).
- crypto: crypto4xx - increase context and scatter ring buffer elements
(bnc#1012382).
- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex
(bnc#1012382).
- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).
- crypto: n2 - cure use after free (bnc#1012382).
- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).
- crypto: s5p-sss - Fix completing crypto request in IRQ handler
(bnc#1012382).
- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).
- cxl: Check if vphb exists before iterating over AFU devices
(bsc#1066223).
- dax: Pass detailed error code from __dax_fault() (bsc#1072484).
- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state
(bnc#1012382).
- delay: add poll_event_interruptible (bsc#1048585).
- dlm: fix malfunction of dlm_tool caused by debugfs changes (bsc#1077704).
- dmaengine: dmatest: move callback wait queue to thread context
(bnc#1012382).
- dmaengine: Fix array index out of bounds warning in __get_unmap_pool()
(bnc#1012382).
- dmaengine: pl330: fix double lock (bnc#1012382).
- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type
(bnc#1012382).
- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).
- dm bufio: fix shrinker scans when (nr_to_scan < retain_target)
(bnc#1012382).
- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).
- drivers/firmware: Expose psci_get_version through psci_ops structure
(bsc#1068032).
- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).
- drm: extra printk() wrapper macros (bnc#1012382).
- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement
(bnc#1012382).
- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU
(bnc#1012382).
- drm/omap: fix dmabuf mmap for dma_alloc'ed buffers (bnc#1012382).
- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).
- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).
- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).
- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE
instead of 0 (bnc#1012382).
- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).
- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).
- edac, sb_edac: Fix missing break in switch (bnc#1012382).
- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).
- efi: Move some sysfs files to be read-only by root (bnc#1012382).
- eventpoll.h: add missing epoll event masks (bnc#1012382).
- ext4: fix crash when a directory's i_size is too small (bnc#1012382).
- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).
- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).
- fbdev: controlfb: Add missing modes to fix out of bounds access
(bnc#1012382).
- Fix build error in vma.c (bnc#1012382).
- Fixup hang when calling 'nvme list' on all paths down (bsc#1070052).
- fjes: Fix wrong netdevice feature flags (bnc#1012382).
- flow_dissector: properly cap thoff field (bnc#1012382).
- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).
- fork: clear thread stack upon allocation (bsc#1077560).
- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).
- futex: Prevent overflow by strengthen input validation (bnc#1012382).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- gfs2: Take inode off order_write list when setting jdata flag
(bnc#1012382).
- gpio: altera: Use handle_level_irq when configured as a level_high
(bnc#1012382).
- hid: chicony: Add support for another ASUS Zen AiO keyboard
(bnc#1012382).
- hid: xinmo: fix for out of range for THT 2P arcade controller
(bnc#1012382).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).
- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).
- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).
- i40iw: Account for IPv6 header when setting MSS (bsc#1024376
FATE#321249).
- i40iw: Allocate a sdbuf per CQP WQE (bsc#1024376 FATE#321249).
- i40iw: Cleanup AE processing (bsc#1024376 FATE#321249).
- i40iw: Clear CQP Head/Tail during initialization (bsc#1024376
FATE#321249).
- i40iw: Correct ARP index mask (bsc#1024376 FATE#321249).
- i40iw: Correct Q1/XF object count equation (bsc#969476 FATE#319648
bsc#969477 FATE#319816).
- i40iw: Do not allow posting WR after QP is flushed (bsc#1024376
FATE#321249).
- i40iw: Do not free sqbuf when event is I40IW_TIMER_TYPE_CLOSE
(bsc#1024376 FATE#321249).
- i40iw: Do not generate CQE for RTR on QP flush (bsc#1024376 FATE#321249).
- i40iw: Do not retransmit MPA request after it is ACKed (bsc#1024376
FATE#321249).
- i40iw: Fixes for static checker warnings (bsc#1024376 FATE#321249).
- i40iw: Fix sequence number for the first partial FPDU (bsc#969476
FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix the connection ORD value for loopback (bsc#969476 FATE#319648
bsc#969477 FATE#319816).
- i40iw: Ignore AE source field in AEQE for some AEs (bsc#1024376
FATE#321249).
- i40iw: Move cqp_cmd_head init to CQP initialization (bsc#1024376
FATE#321249).
- i40iw: Move exception_lan_queue to VSI structure (bsc#1024376
FATE#321249).
- i40iw: Move MPA request event for loopback after connect (bsc#1024376
FATE#321249).
- i40iw: Notify user of established connection after QP in RTS
(bsc#1024376 FATE#321249).
- i40iw: Reinitialize IEQ on MTU change (bsc#1024376 FATE#321249).
- i40iw: Remove limit on re-posting AEQ entries to HW (bsc#969476
FATE#319648 bsc#969477 FATE#319816).
- i40iw: Selectively teardown QPs on IP addr change event (bsc#1024376
FATE#321249).
- i40iw: Validate correct IRD/ORD connection parameters (bsc#969476
FATE#319648 bsc#969477 FATE#319816).
- ib/hfi1: Fix misspelling in comment (bsc#973818, fate#319242).
- ib/hfi1: Prevent kernel QP post send hard lockups (bsc#973818
FATE#319242).
- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush
(git-fixes).
- ib/ipoib: Fix race condition in neigh creation (bsc#1022595 FATE#322350).
- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop
(bnc#1012382).
- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).
- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).
- ib/mlx5: Serialize access to the VMA list (bsc#1015342 FATE#321688
bsc#1015343 FATE#321689).
- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).
- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).
- ibmvnic: fix firmware version when no firmware level has been provided
by the VIOS server (bsc#1079038).
- ibmvnic: Fix IP offload control buffer (bsc#1076899).
- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).
- ibmvnic: Fix pending MAC address changes (bsc#1075627).
- ibmvnic: Modify buffer size and number of queues on failover
(bsc#1076872).
- ibmvnic: Revert to previous mtu when unsupported value requested
(bsc#1076872).
- ibmvnic: Wait for device response when changing MAC (bsc#1078681).
- ib/qib: Fix comparison error with qperf compare/swap test (FATE#321231
FATE#321473).
- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (bsc#973818,
fate#319242).
- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).
- ib/srpt: Fix ACL lookup during login (bsc#1024296 FATE#321265).
- igb: check memory allocation failure (bnc#1012382).
- ima: fix hash algorithm initialization (bnc#1012382).
- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).
- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).
- input: elantech - add new icbody type 15 (bnc#1012382).
- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list
(bnc#1012382).
- input: trackpoint - force 3 buttons if 0 button is reported
(bnc#1012382).
- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).
- input: twl6040-vibra - fix child-node lookup (bnc#1012382).
- input: twl6040-vibra - fix DT node memory management (bnc#1012382).
- intel_th: pci: Add Gemini Lake support (bnc#1012382).
- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).
- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).
- ip6_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912
FATE#321246).
- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).
- ipmi: Stop timers before cleaning up the module (bnc#1012382).
- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).
- ipv4: igmp: guard against silly MTU values (bnc#1012382).
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be
INADDR_ANY (bnc#1012382).
- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL
(bnc#1012382).
- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).
- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).
- ipv6: mcast: better catch silly mtu values (bnc#1012382).
- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).
- ipvlan: fix ipv6 outbound device (bnc#1012382).
- ipvlan: remove excessive packet scrubbing (bsc#1070799).
- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).
- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).
- iscsi_iser: Re-enable 'iser_pi_guard' module parameter (bsc#1062129).
- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).
- iscsi-target: Make TASK_REASSIGN use proper se_cmd->cmd_kref
(bnc#1012382).
- isdn: kcapi: avoid uninitialized data (bnc#1012382).
- iser-target: Fix possible use-after-free in connection establishment
error (FATE#321732).
- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).
- ixgbe: fix use of uninitialized padding (bnc#1012382).
- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).
- kabi: Keep KVM stable after enable s390 wire up bpb feature
(bsc#1076805).
- kABI: protect struct bpf_map (kabi).
- kABI: protect struct ipv6_pinfo (kabi).
- kABI: protect struct t10_alua_tg_pt_gp (kabi).
- kABI: protect struct usbip_device (kabi).
- kabi/severities: arm64: ignore cpu capability array
- kabi/severities: do not care about stuff_RSB
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kbuild: add '-fno-stack-check' to kernel build options (bnc#1012382).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621
bsc#1068032).
- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).
- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).
- kernel/acct.c: fix the acct->needcheck check in check_free_space()
(bnc#1012382).
- kernel: make groups_sort calling a responsibility group_info allocators
(bnc#1012382).
- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from
!sig_kernel_only() signals (bnc#1012382).
- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL
(bnc#1012382).
- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in
complete_signal() (bnc#1012382).
- keys: add missing permission check for request_key() destination
(bnc#1012382).
- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).
- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).
- kpti: Report when enabled (bnc#1012382).
- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).
- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset
(bnc#1012382).
- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).
- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables
(bnc#1012382).
- kvm: s390: Enable all facility bits that are known good for passthrough
(bsc#1076805).
- kvm: s390: wire up bpb feature (bsc#1076805).
- kvm: VMX: Fix enable VPID conditions (bnc#1012382).
- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).
- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382 bsc#1068032).
- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).
- kvm: x86: correct async page present tracepoint (bnc#1012382).
- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).
- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).
- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).
- lan78xx: Fix failure in USB Full Speed (bnc#1012382).
- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
(bnc#1012382).
- libata: drop WARN from protocol error in ata_sff_qc_issue()
(bnc#1012382).
- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).
- macvlan: Only deliver one copy of the frame to the macvlan interface
(bnc#1012382).
- md: more open-coded offset_in_page() (bsc#1076110).
- media: dvb: i2c transfers over usb cannot be done from stack
(bnc#1012382).
- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).
- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).
- mfd: twl6040: Fix child-node lookup (bnc#1012382).
- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).
- mlxsw: reg: Fix SPVM max record count (bnc#1012382).
- mm: avoid returning VM_FAULT_RETRY from ->page_mkwrite handlers
(bnc#1012382).
- mmc: mediatek: Fixed bug where clock frequency could be set wrong
(bnc#1012382).
- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).
- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).
- mm/mprotect: add a cond_resched() inside change_pmd_range()
(bnc#1077871, bnc#1078002).
- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP
(bnc#1012382).
- module: Add retpoline tag to VERMAGIC (bnc#1012382).
- module: set __jump_table alignment to 8 (bnc#1012382).
- more bio_map_user_iov() leak fixes (bnc#1012382).
- net: Allow neigh contructor functions ability to modify the primary_key
(bnc#1012382).
- net/appletalk: Fix kernel memory disclosure (bnc#1012382).
- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).
- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values
(bnc#1012382).
- net: bcmgenet: power down internal phy if open or resume fails
(bnc#1012382).
- net: bcmgenet: Power up the internal PHY before probing the MII
(bnc#1012382).
- net: bcmgenet: reserved phy revisions must be checked first
(bnc#1012382).
- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink
leaks (bnc#1012382).
- net: core: fix module type in sock_diag_bind (bnc#1012382).
- net: Do not allow negative values for busy_read and busy_poll sysctl
interfaces (bnc#1012382).
- net: fec: fix multicast filtering hardware setup (bnc#1012382).
- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).
- netfilter: do not track fragmented packets (bnc#1012382).
- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).
- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).
- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).
- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash
table (bnc#1012382).
- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).
- netfilter: nfnl_cthelper: fix runtime expectation policy updates
(bnc#1012382).
- net: Fix double free and memory corruption in get_net_ns_by_id()
(bnc#1012382).
- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).
- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).
- net: initialize msg.msg_flags in recvfrom (bnc#1012382).
- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).
- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y
(bnc#1012382).
- net/mlx5: Avoid NULL pointer dereference on steering cleanup
(bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Cleanup IRQs in case of unload failure (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net/mlx5e: Add refcount to VXLAN structure (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net/mlx5e: Fix features check of IPv6 traffic (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net/mlx5e: Fix fixpoint divide exception in mlx5e_am_stats_compare
(bsc#1015342).
- net/mlx5e: Fix possible deadlock of VXLAN lock (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net/mlx5e: Prevent possible races in VXLAN control flow (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix rate limit packet pacing naming and struct (bsc#1015342
FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Stay in polling mode when command EQ destroy fails (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).
- net: mvneta: clear interface link status on port disable (bnc#1012382).
- net: mvneta: eliminate wrong call to handle rx descriptor error
(fate#319899).
- net: mvneta: use proper rxq_number in loop on rx queues (fate#319899).
- net/packet: fix a race in packet_bind() and packet_notifier()
(bnc#1012382).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).
- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg
workaround (bnc#1012382).
- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).
- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).
- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4
(bnc#1012382).
- net: reevalulate autoflowlabel setting after sysctl setting
(bnc#1012382).
- net: Resend IGMP memberships upon peer notification (bnc#1012382).
- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).
- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).
- net: systemport: Pad packet before inserting TSB (bnc#1012382).
- net: systemport: Utilize skb_put_padto() (bnc#1012382).
- net: tcp: close sock if net namespace is exiting (bnc#1012382).
- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).
- nfs: Add a cond_resched() to nfs_commit_release_pages() (bsc#1077779).
- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).
- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).
- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).
- nfs: Do not take a reference on fl->fl_file for LOCK operation
(bnc#1012382).
- nfs: Fix a typo in nfs_rename() (bnc#1012382).
- nfsv4.1 respect server's max size in CREATE_SESSION (bnc#1012382).
- nfsv4: Fix client recovery when server reboots multiple times
(bnc#1012382).
- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick()
(bnc#1012382).
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
(bnc#1012382).
- nvme_fc: correct hang in nvme_ns_remove() (bsc#1075811).
- nvme_fc: fix rogue admin cmds stalling teardown (bsc#1075811).
- nvme-fc: merge error on sles12sp3 for reset_work (bsc#1079195).
- nvme-pci: Remove watchdog timer (bsc#1066163).
- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).
- packet: fix crash in fanout_demux_rollover() (bnc#1012382).
- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel
(bnc#1012382).
- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).
- partially revert tipc improve link resiliency when rps is activated
(bsc#1068038).
- pci/AER: Report non-fatal errors only to the affected endpoint
(bnc#1012382).
- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).
- pci: Create SR-IOV virtfn/physfn links before attaching driver
(bnc#1012382).
- pci: Detach driver before procfs & sysfs teardown on device remove
(bnc#1012382).
- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).
- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).
- perf symbols: Fix symbols__fixup_end heuristic for corner cases
(bnc#1012382).
- perf test attr: Fix ignored test case result (bnc#1012382).
- phy: work around 'phys' references to usb-nop-xceiv devices
(bnc#1012382).
- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).
- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).
- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid
(bsc#1068032, bsc#1075087).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas
(bsc#1068032, bsc#1075087).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032,
bsc#1075087).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,
bsc#1075087).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti
(bsc#1068032, bsc#1075087).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032,
bsc#1075087).
- powerpc/ipic: Fix status get and status clear (bnc#1012382).
- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).
- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).
- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032,
bsc#1075087).
- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo
(bnc#1012382).
- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested
(bnc#1012382).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032,
bsc#1075087).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032,
bsc#1075087).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,
bsc#1075087).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration
(bsc#1068032, bsc#1075087).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,
bsc#1075087).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032,
bsc#1075087).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI)
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: prevent crash when changing flush type to fallback
after system boot (bsc#1068032, bsc#1075087).
- ppp: Destroy the mutex when cleanup (bnc#1012382).
- pppoe: take ->needed_headroom of lower device into account on xmit
(bnc#1012382).
- pti: unbreak EFI (bsc#1074709).
- r8152: fix the list rx_done may be used without initialization
(bnc#1012382).
- r8152: prevent the driver from transmitting packets with carrier off
(bnc#1012382).
- r8169: fix memory corruption on retrieval of hardware statistics
(bnc#1012382).
- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).
- ravb: Remove Rx overflow log messages (bnc#1012382).
- rbd: set max_segments to USHRT_MAX (bnc#1012382).
- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).
- rdma/i40iw: Remove MSS change support (bsc#1024376 FATE#321249).
- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).
- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).
- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).
- regulator: core: Rely on regulator_dev_release to free constraints
(bsc#1074847).
- regulator: da9063: Return an error code on probe failure (bsc#1074847).
- regulator: pwm: Fix regulator ramp delay for continuous mode
(bsc#1074847).
- regulator: Try to resolve regulators supplies on registration
(bsc#1074847).
- Revert "Bluetooth: btusb: driver to enable the usb-wakeup feature"
(bnc#1012382).
- Revert "drm/armada: Fix compile fail" (bnc#1012382).
- Revert "kaiser: vmstat show NR_KAISERTABLE as nr_overhead" (kabi).
- Revert "lib/genalloc.c: make the avail variable an atomic_long_t" (kabi).
- Revert "module: Add retpoline tag to VERMAGIC" (bnc#1012382 kabi).
- Revert "module: Add retpoline tag to VERMAGIC" (kabi).
- Revert "ocfs2: should wait dio before inode lock in ocfs2_setattr()"
(bnc#1012382).
- Revert "s390/kbuild: enable modversions for symbols exported from asm"
(bnc#1012382).
- Revert "sched/deadline: Use the revised wakeup rule for suspending
constrained dl tasks" (kabi).
- Revert "scsi: libsas: align sata_device's rps_resp on a cacheline"
(kabi).
- Revert "spi: SPI_FSL_DSPI should depend on HAS_DMA" (bnc#1012382).
- Revert "userfaultfd: selftest: vm: allow to build in vm/ directory"
(bnc#1012382).
- Revert "x86/efi: Build our own page table structures" (bnc#1012382).
- Revert "x86/efi: Hoist page table switching code into efi_call_virt()"
(bnc#1012382).
- Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
(bnc#1012382).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).
- ring-buffer: Mask out the info bits when returning buffer page length
(bnc#1012382).
- route: also update fnhe_genid when updating a route cache (bnc#1012382).
- route: update fnhe_expires for redirect when the fnhe exists
(bnc#1012382).
- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).
- rtc: pcf8563: fix output clock rate (bnc#1012382).
- rtc: pl031: make interrupt optional (bnc#1012382).
- rtc: set the alarm to the next expiring timer (bnc#1012382).
- s390: always save and restore all registers on context switch
(bnc#1012382).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847,
LTC#163740).
- s390: fix compat system call table (bnc#1012382).
- s390/pci: do not require AIS facility (bnc#1012382).
- s390/qeth: no ETH header for outbound AF_IUCV (LTC#156276 bnc#1012382
bnc#1053472).
- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).
- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).
- sched/deadline: Make sure the replenishment timer fires in the next
period (bnc#1012382).
- sched/deadline: Throttle a constrained deadline task activated after the
deadline (bnc#1012382).
- sched/deadline: Use deadline instead of period when calculating overflow
(bnc#1012382).
- sched/deadline: Use the revised wakeup rule for suspending constrained
dl tasks (bnc#1012382).
- sched/deadline: Zero out positive runtime after throttling constrained
tasks (git-fixes).
- scsi: bfa: integer overflow in debugfs (bnc#1012382).
- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).
- scsi: handle ABORTED_COMMAND on Fujitsu ETERNUS (bsc#1069138).
- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading
(bnc#1012382).
- scsi: hpsa: destroy sas transport properties before scsi_host
(bnc#1012382).
- scsi: libsas: align sata_device's rps_resp on a cacheline (bnc#1012382).
- scsi: lpfc: Use after free in lpfc_rq_buf_free() (bsc#1037838).
- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1
volume created on two SATA drive (bnc#1012382).
- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).
- scsi: sd: change manage_start_stop to bool in sysfs interface
(bnc#1012382).
- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- sctp: do not allow the v4 socket to bind a v4mapped v6 address
(bnc#1012382).
- sctp: do not free asoc when it is already dead in sctp_sendmsg
(bnc#1012382).
- sctp: Replace use of sockets_allocated with specified macro
(bnc#1012382).
- sctp: return error if the asoc has been peeled off in
sctp_wait_for_sndbuf (bnc#1012382).
- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).
- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).
- selftests/x86: Add test_vsyscall (bnc#1012382).
- selftests/x86/ldt_get: Add a few additional tests for limits
(bnc#1012382).
- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).
- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).
- series.conf: move core networking (including netfilter) into sorted
section
- series.conf: whitespace cleanup
- Set supported_modules_check 1 (bsc#1072163).
- sfc: do not warn on successful change of MAC (bnc#1012382).
- sh_eth: fix SH7757 GEther initialization (bnc#1012382).
- sh_eth: fix TSU resource handling (bnc#1012382).
- sit: update frag_off info (bnc#1012382).
- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).
- sparc64/mm: set fields in deferred pages (bnc#1012382).
- spi_ks8995: fix "BUG: key accdaa28 not in .data!" (bnc#1012382).
- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).
- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).
- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
(bnc#1012382).
- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).
- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- sysrq : fix Show Regs call trace on ARM (bnc#1012382).
- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK
(bnc#1012382).
- target/file: Do not return error for UNMAP if length is zero
(bnc#1012382).
- target: fix ALUA transition timeout handling (bnc#1012382).
- target:fix condition return in core_pr_dump_initiator_port()
(bnc#1012382).
- target: fix race during implicit transition work flushes (bnc#1012382).
- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd()
(bnc#1012382).
- target: Use system workqueue for ALUA transitions (bnc#1012382).
- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).
- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).
- tcp md5sig: Use skb's saddr when replying to an incoming segment
(bnc#1012382).
- tcp: __tcp_hdrlen() helper (bnc#1012382).
- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).
- thermal/drivers/step_wise: Fix temperature regulation misbehavior
(bnc#1012382).
- thermal: hisilicon: Handle return value of clk_prepare_enable
(bnc#1012382).
- tipc: fix cleanup at module unload (bnc#1012382).
- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).
- tipc: improve link resiliency when rps is activated (bsc#1068038).
- tracing: Allocate mask_str buffer dynamically (bnc#1012382).
- tracing: Fix converting enum's from the map in trace_event_eval_update()
(bnc#1012382).
- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).
- tracing: Fix possible double free on failure of allocating trace buffer
(bnc#1012382).
- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).
- tty fix oops when rmmod 8250 (bnc#1012382).
- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).
- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).
- udf: Avoid overflow when session starts at large offset (bnc#1012382).
- um: link vmlinux with -no-pie (bnc#1012382).
- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).
- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).
- usb: core: Add type-specific length check of BOS descriptors
(bnc#1012382).
- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).
- usb: devio: Prevent integer overflow in proc_do_submiturb()
(bnc#1012382).
- usb: Fix off by one in type-specific length check of BOS SSP capability
(git-fixes).
- usb: fix usbmon BUG trigger (bnc#1012382).
- usb: gadget: configs: plug memory leak (bnc#1012382).
- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping
(bnc#1012382).
- usb: gadgetfs: Fix a potential memory leak in 'dev_config()'
(bnc#1012382).
- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed
(bnc#1012382).
- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).
- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).
- usb: Increase usbfs transfer limit (bnc#1012382).
- usbip: Fix implicit fallthrough warning (bnc#1012382).
- usbip: Fix potential format overflow in userspace tools (bnc#1012382).
- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).
- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input
(bnc#1012382).
- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer
(bnc#1012382).
- usbip: fix usbip bind writing random string after command in match_busid
(bnc#1012382).
- usbip: prevent leaking socket pointer address in messages (bnc#1012382).
- usbip: prevent vhci_hcd driver from leaking a socket pointer address
(bnc#1012382).
- usbip: remove kernel addresses from usb device and urb debug msgs
(bnc#1012382).
- usbip: stub: stop printing kernel pointer addresses in messages
(bnc#1012382).
- usbip: vhci: stop printing kernel pointer addresses in messages
(bnc#1012382).
- usb: misc: usb3503: make sure reset is low for at least 100us
(bnc#1012382).
- usb: musb: da8xx: fix babble condition handling (bnc#1012382).
- usb: phy: isp1301: Add OF device ID table (bnc#1012382).
- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled
(git-fixes).
- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).
- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub
(bnc#1012382).
- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ
(bnc#1012382).
- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).
- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).
- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).
- usb: serial: option: add Quectel BG96 id (bnc#1012382).
- usb: serial: option: add support for Telit ME910 PID 0x1101
(bnc#1012382).
- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).
- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID
(bnc#1012382).
- usb: usbfs: Filter flags passed in from user space (bnc#1012382).
- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).
- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).
- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).
- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).
- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).
- video: fbdev: au1200fb: Release some resources if a memory allocation
fails (bnc#1012382).
- video: fbdev: au1200fb: Return an error code if a memory allocation
fails (bnc#1012382).
- virtio: release virtio index when fail to device_register (bnc#1012382).
- vmxnet3: repair memory leak (bnc#1012382).
- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).
- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend
(bnc#1012382).
- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).
- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).
- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq
(bnc#1012382).
- writeback: fix memory leak in wb_queue_work() (bnc#1012382).
- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).
- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).
- x86/acpi: Handle SCI interrupts above legacy space gracefully
(bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq()
(bsc#1068984).
- x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
(bnc#1012382).
- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).
- x86/apic/vector: Fix off by one in error path (bnc#1012382).
- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels
(bnc#1012382).
- x86/boot: Fix early command-line parsing when matching at end
(bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#985025).
- x86/cpu: Rename "WESTMERE2" family to "NEHALEM_G" (bsc#985025).
- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).
- x86/Documentation: Add PTI description (bnc#1012382).
- x86/efi: Build our own page table structures (fate#320512).
- x86/efi: Hoist page table switching code into efi_call_virt()
(fate#320512).
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
(bnc#1012382).
- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).
- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).
- x86/kasan: Write protect kasan zero shadow (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check
(bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading with a revision check
(bnc#1012382).
- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).
- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
(git-fixes).
- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).
- x86/mm/pat: Ensure cpa->pfn only contains page frame numbers
(fate#320588).
- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).
- x86/pti: Document fix wrong index (bnc#1012382).
- x86/pti/efi: broken conversion from efi to kernel page table
(bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active
(bsc#1068032).
- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994
bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).
- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly()
(bnc#1012382).
- xen-netfront: avoid crashing on resume after a failure in
talk_to_netback() (bnc#1012382).
- xen-netfront: Improve error handling during initialization (bnc#1012382).
- xfrm: Copy policy family in clone_policy (bnc#1012382).
- xfs: add configurable error support to metadata buffers (bsc#1068569).
- xfs: add configuration handlers for specific errors (bsc#1068569).
- xfs: add configuration of error failure speed (bsc#1068569).
- xfs: add "fail at unmount" error handling configuration (bsc#1068569).
- xfs: Add infrastructure needed for error propagation during buffer IO
failure (bsc#1068569).
- xfs: address kabi for xfs buffer retry infrastructure (kabi).
- xfs: configurable error behavior via sysfs (bsc#1068569).
- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real
(bnc#1012382).
- xfs: fix log block underflow during recovery cycle verification
(bnc#1012382).
- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).
- xfs: introduce metadata IO error class (bsc#1068569).
- xfs: introduce table-based init for error behaviors (bsc#1068569).
- xfs: Properly retry failed inode items in case of error during buffer
writeback (bsc#1068569).
- xfs: reinit btree pointer on attr tree inactivation walk (bsc#1078787).
- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).
- xfs: validate sb_logsunit is a multiple of the fs blocksize
(bsc#1077513).
- xhci: Do not add a virt_dev to the devs array before it's fully
allocated (bnc#1012382).
- xhci: Fix ring leak in failure path of xhci_alloc_virt_device()
(bnc#1012382).
- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).
- zram: set physical queue limits to avoid array out of bounds accesses
(bnc#1012382).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-153=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (x86_64):
kernel-debug-4.4.114-42.1
kernel-debug-base-4.4.114-42.1
kernel-debug-base-debuginfo-4.4.114-42.1
kernel-debug-debuginfo-4.4.114-42.1
kernel-debug-debugsource-4.4.114-42.1
kernel-debug-devel-4.4.114-42.1
kernel-debug-devel-debuginfo-4.4.114-42.1
kernel-default-4.4.114-42.1
kernel-default-base-4.4.114-42.1
kernel-default-base-debuginfo-4.4.114-42.1
kernel-default-debuginfo-4.4.114-42.1
kernel-default-debugsource-4.4.114-42.1
kernel-default-devel-4.4.114-42.1
kernel-obs-build-4.4.114-42.1
kernel-obs-build-debugsource-4.4.114-42.1
kernel-obs-qa-4.4.114-42.1
kernel-syms-4.4.114-42.1
kernel-vanilla-4.4.114-42.1
kernel-vanilla-base-4.4.114-42.1
kernel-vanilla-base-debuginfo-4.4.114-42.1
kernel-vanilla-debuginfo-4.4.114-42.1
kernel-vanilla-debugsource-4.4.114-42.1
kernel-vanilla-devel-4.4.114-42.1
kselftests-kmp-debug-4.4.114-42.1
kselftests-kmp-debug-debuginfo-4.4.114-42.1
kselftests-kmp-default-4.4.114-42.1
kselftests-kmp-default-debuginfo-4.4.114-42.1
kselftests-kmp-vanilla-4.4.114-42.1
kselftests-kmp-vanilla-debuginfo-4.4.114-42.1
- openSUSE Leap 42.3 (noarch):
kernel-devel-4.4.114-42.1
kernel-docs-4.4.114-42.1
kernel-docs-html-4.4.114-42.1
kernel-docs-pdf-4.4.114-42.1
kernel-macros-4.4.114-42.1
kernel-source-4.4.114-42.1
kernel-source-vanilla-4.4.114-42.1
References:
https://www.suse.com/security/cve/CVE-2017-15129.html
https://www.suse.com/security/cve/CVE-2017-17712.html
https://www.suse.com/security/cve/CVE-2017-17862.html
https://www.suse.com/security/cve/CVE-2017-17864.html
https://www.suse.com/security/cve/CVE-2017-18017.html
https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-5332.html
https://www.suse.com/security/cve/CVE-2018-5333.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1015342
https://bugzilla.suse.com/1015343
https://bugzilla.suse.com/1019784
https://bugzilla.suse.com/1022595
https://bugzilla.suse.com/1022912
https://bugzilla.suse.com/1024296
https://bugzilla.suse.com/1024376
https://bugzilla.suse.com/1031492
https://bugzilla.suse.com/1031717
https://bugzilla.suse.com/1037838
https://bugzilla.suse.com/1038078
https://bugzilla.suse.com/1038085
https://bugzilla.suse.com/1040182
https://bugzilla.suse.com/1043652
https://bugzilla.suse.com/1048325
https://bugzilla.suse.com/1048585
https://bugzilla.suse.com/1053472
https://bugzilla.suse.com/1060279
https://bugzilla.suse.com/1062129
https://bugzilla.suse.com/1066163
https://bugzilla.suse.com/1066223
https://bugzilla.suse.com/1068032
https://bugzilla.suse.com/1068038
https://bugzilla.suse.com/1068569
https://bugzilla.suse.com/1068984
https://bugzilla.suse.com/1069138
https://bugzilla.suse.com/1069160
https://bugzilla.suse.com/1070052
https://bugzilla.suse.com/1070799
https://bugzilla.suse.com/1072163
https://bugzilla.suse.com/1072484
https://bugzilla.suse.com/1073229
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1073928
https://bugzilla.suse.com/1074134
https://bugzilla.suse.com/1074488
https://bugzilla.suse.com/1074621
https://bugzilla.suse.com/1074709
https://bugzilla.suse.com/1074839
https://bugzilla.suse.com/1074847
https://bugzilla.suse.com/1075066
https://bugzilla.suse.com/1075078
https://bugzilla.suse.com/1075087
https://bugzilla.suse.com/1075091
https://bugzilla.suse.com/1075397
https://bugzilla.suse.com/1075428
https://bugzilla.suse.com/1075617
https://bugzilla.suse.com/1075621
https://bugzilla.suse.com/1075627
https://bugzilla.suse.com/1075811
https://bugzilla.suse.com/1075994
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1076110
https://bugzilla.suse.com/1076187
https://bugzilla.suse.com/1076232
https://bugzilla.suse.com/1076805
https://bugzilla.suse.com/1076847
https://bugzilla.suse.com/1076872
https://bugzilla.suse.com/1076899
https://bugzilla.suse.com/1077068
https://bugzilla.suse.com/1077513
https://bugzilla.suse.com/1077560
https://bugzilla.suse.com/1077592
https://bugzilla.suse.com/1077704
https://bugzilla.suse.com/1077779
https://bugzilla.suse.com/1077871
https://bugzilla.suse.com/1078002
https://bugzilla.suse.com/1078681
https://bugzilla.suse.com/1078787
https://bugzilla.suse.com/1079038
https://bugzilla.suse.com/1079195
https://bugzilla.suse.com/963844
https://bugzilla.suse.com/966170
https://bugzilla.suse.com/966172
https://bugzilla.suse.com/969476
https://bugzilla.suse.com/969477
https://bugzilla.suse.com/973818
https://bugzilla.suse.com/985025
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2018:0406-1: important: Security update for docker, docker-runc, containerd, golang-github-docker-libnetwork
by opensuse-security@opensuse.org 08 Feb '18
by opensuse-security@opensuse.org 08 Feb '18
08 Feb '18
openSUSE Security Update: Security update for docker, docker-runc, containerd, golang-github-docker-libnetwork
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0406-1
Rating: important
References: #1021227 #1029320 #1032287 #1045628 #1046024
#1048046 #1051429 #1053532 #1055676 #1057743
#1058173 #1059011 #1064926 #1065109 #1066210
#1066801 #1069468 #1069758 #1072798
Cross-References: CVE-2017-14992 CVE-2017-16539
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves two vulnerabilities and has 17 fixes
is now available.
Description:
This update for docker, docker-runc, containerd,
golang-github-docker-libnetwork fixes several issues.
These security issues were fixed:
- CVE-2017-16539: The DefaultLinuxSpec function in oci/defaults.go docker
did not block /proc/scsi pathnames, which allowed attackers to trigger
data loss (when certain older Linux kernels are used) by leveraging
Docker container access to write a "scsi remove-single-device" line to
/proc/scsi/scsi, aka SCSI MICDROP (bnc#1066801)
- CVE-2017-14992: Lack of content verification in docker allowed a remote
attacker to cause a Denial of Service via a crafted image layer payload,
aka gzip bombing. (bnc#1066210)
These non-security issues were fixed:
- bsc#1059011: The systemd service helper script used a timeout of 60
seconds to start the daemon, which is insufficient in cases where the
daemon takes longer to start. Instead, set the service type from
'simple' to 'notify' and remove the now superfluous helper script.
- bsc#1057743: New requirement with new version of docker-libnetwork.
- bsc#1032287: Missing docker systemd configuration.
- bsc#1057743: New "symbol" for libnetwork requirement.
- bsc#1057743: Update secrets patch to handle "old" containers that have
orphaned secret data no longer available on the host.
- bsc#1055676: Update patches to correctly handle volumes and mounts when
Docker is running with user namespaces enabled.
- bsc#1045628:: Add patch to make the dm storage driver remove a
container's rootfs mountpoint before attempting to do libdm operations
on it. This helps avoid complications when live mounts will leak into
containers.
- bsc#1069758: Upgrade Docker to v17.09.1_ce (and obsolete
docker-image-migrator).
- bsc#1021227: bsc#1029320 bsc#1058173 -- Enable docker devicemapper
support for deferred removal/deletion within Containers module.
- bsc#1046024: Correct interaction between Docker and SuSEFirewall2, to
avoid breaking Docker networking after boot.
- bsc#1048046: Build with -buildmode=pie to make all binaries PIC.
- bsc#1072798: Remove dependency on obsolete bridge-utils.
- bsc#1064926: Set --start-timeout=2m by default to match upstream.
- bsc#1065109, bsc#1053532: Use the upstream makefile so that Docker can
get the commit ID in `docker info`.
Please note that the "docker-runc" package is just a rename of the old
"runc" package to match that we now ship the Docker fork of runc.
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-152=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
containerd-0.2.9+gitr706_06b9cb351610-16.1
containerd-ctr-0.2.9+gitr706_06b9cb351610-16.1
containerd-ctr-debuginfo-0.2.9+gitr706_06b9cb351610-16.1
containerd-debuginfo-0.2.9+gitr706_06b9cb351610-16.1
containerd-debugsource-0.2.9+gitr706_06b9cb351610-16.1
docker-libnetwork-0.7.0.1+gitr2066_7b2b1feb1de4-5.1
docker-libnetwork-debuginfo-0.7.0.1+gitr2066_7b2b1feb1de4-5.1
docker-runc-1.0.0rc4+gitr3338_3f2f8b84a77f-2.1
docker-runc-debuginfo-1.0.0rc4+gitr3338_3f2f8b84a77f-2.1
docker-runc-debugsource-1.0.0rc4+gitr3338_3f2f8b84a77f-2.1
golang-github-docker-libnetwork-0.7.0.1+gitr2066_7b2b1feb1de4-5.1
golang-github-docker-libnetwork-debugsource-0.7.0.1+gitr2066_7b2b1feb1de4-5.1
- openSUSE Leap 42.3 (x86_64):
docker-17.09.1_ce-36.1
docker-debuginfo-17.09.1_ce-36.1
docker-debugsource-17.09.1_ce-36.1
docker-test-17.09.1_ce-36.1
docker-test-debuginfo-17.09.1_ce-36.1
- openSUSE Leap 42.3 (noarch):
containerd-test-0.2.9+gitr706_06b9cb351610-16.1
docker-bash-completion-17.09.1_ce-36.1
docker-runc-test-1.0.0rc4+gitr3338_3f2f8b84a77f-2.1
docker-zsh-completion-17.09.1_ce-36.1
References:
https://www.suse.com/security/cve/CVE-2017-14992.html
https://www.suse.com/security/cve/CVE-2017-16539.html
https://bugzilla.suse.com/1021227
https://bugzilla.suse.com/1029320
https://bugzilla.suse.com/1032287
https://bugzilla.suse.com/1045628
https://bugzilla.suse.com/1046024
https://bugzilla.suse.com/1048046
https://bugzilla.suse.com/1051429
https://bugzilla.suse.com/1053532
https://bugzilla.suse.com/1055676
https://bugzilla.suse.com/1057743
https://bugzilla.suse.com/1058173
https://bugzilla.suse.com/1059011
https://bugzilla.suse.com/1064926
https://bugzilla.suse.com/1065109
https://bugzilla.suse.com/1066210
https://bugzilla.suse.com/1066801
https://bugzilla.suse.com/1069468
https://bugzilla.suse.com/1069758
https://bugzilla.suse.com/1072798
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2018:0398-1: important: Security update for plasma5-workspace
by opensuse-security@opensuse.org 08 Feb '18
by opensuse-security@opensuse.org 08 Feb '18
08 Feb '18
openSUSE Security Update: Security update for plasma5-workspace
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0398-1
Rating: important
References: #1013550 #1079429 #1079751
Cross-References: CVE-2018-6790 CVE-2018-6791
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for plasma5-workspace fixes security issues and bugs.
The following vulnerabilities were fixed:
- CVE-2018-6790: Desktop notifications could have been used to load
arbitrary remote images into Plasma, allowing for client IP discovery
(boo#1079429)
- CVE-2018-6791: A specially crafted file system label may have allowed
execution of arbitrary code (boo#1079751)
The following bugs were fixed:
- Plasma could freeze with certain notifications (boo#1013550)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-147=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
drkonqi5-5.8.7-8.1
plasma5-workspace-5.8.7-8.1
plasma5-workspace-devel-5.8.7-8.1
plasma5-workspace-libs-5.8.7-8.1
- SUSE Package Hub for SUSE Linux Enterprise 12 (noarch):
plasma5-workspace-lang-5.8.7-8.1
References:
https://www.suse.com/security/cve/CVE-2018-6790.html
https://www.suse.com/security/cve/CVE-2018-6791.html
https://bugzilla.suse.com/1013550
https://bugzilla.suse.com/1079429
https://bugzilla.suse.com/1079751
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2018:0397-1: important: Security update for plasma5-workspace
by opensuse-security@opensuse.org 08 Feb '18
by opensuse-security@opensuse.org 08 Feb '18
08 Feb '18
openSUSE Security Update: Security update for plasma5-workspace
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0397-1
Rating: important
References: #1013550 #1079429 #1079751
Cross-References: CVE-2018-6790 CVE-2018-6791
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for plasma5-workspace fixes security issues and bugs.
The following vulnerabilities were fixed:
- CVE-2018-6790: Desktop notifications could have been used to load
arbitrary remote images into Plasma, allowing for client IP discovery
(boo#1079429)
- CVE-2018-6791: A specially crafted file system label may have allowed
execution of arbitrary code (boo#1079751)
The following bugs were fixed:
- Plasma could freeze with certain notifications (boo#1013550)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-147=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (x86_64):
drkonqi5-5.8.7-11.1
drkonqi5-debuginfo-5.8.7-11.1
plasma5-workspace-5.8.7-11.1
plasma5-workspace-debuginfo-5.8.7-11.1
plasma5-workspace-debugsource-5.8.7-11.1
plasma5-workspace-devel-5.8.7-11.1
plasma5-workspace-libs-5.8.7-11.1
plasma5-workspace-libs-debuginfo-5.8.7-11.1
- openSUSE Leap 42.3 (noarch):
plasma5-workspace-lang-5.8.7-11.1
References:
https://www.suse.com/security/cve/CVE-2018-6790.html
https://www.suse.com/security/cve/CVE-2018-6791.html
https://bugzilla.suse.com/1013550
https://bugzilla.suse.com/1079429
https://bugzilla.suse.com/1079751
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0386-1: important: Version update for docker, docker-runc, containerd, golang-github-docker-libnetwork
by opensuse-security@opensuse.org 07 Feb '18
by opensuse-security@opensuse.org 07 Feb '18
07 Feb '18
SUSE Security Update: Version update for docker, docker-runc, containerd, golang-github-docker-libnetwork
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0386-1
Rating: important
References: #1021227 #1029320 #1032287 #1045628 #1046024
#1048046 #1051429 #1053532 #1055676 #1057743
#1058173 #1059011 #1064926 #1065109 #1066210
#1066801 #1069468 #1069758 #1072798
Cross-References: CVE-2017-14992 CVE-2017-16539
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Module for Containers 12
______________________________________________________________________________
An update that solves two vulnerabilities and has 17 fixes
is now available.
Description:
This update for docker, docker-runc, containerd,
golang-github-docker-libnetwork fixes several issues.
These security issues were fixed:
- CVE-2017-16539: The DefaultLinuxSpec function in oci/defaults.go docker
did not block /proc/scsi pathnames, which allowed attackers to trigger
data loss (when certain older Linux kernels are used) by leveraging
Docker container access to write a "scsi remove-single-device" line to
/proc/scsi/scsi, aka SCSI MICDROP (bnc#1066801)
- CVE-2017-14992: Lack of content verification in docker allowed a remote
attacker to cause a Denial of Service via a crafted image layer payload,
aka gzip bombing. (bnc#1066210)
These non-security issues were fixed:
- bsc#1059011: The systemd service helper script used a timeout of 60
seconds to start the daemon, which is insufficient in cases where the
daemon takes longer to start. Instead, set the service type from
'simple' to 'notify' and remove the now superfluous helper script.
- bsc#1057743: New requirement with new version of docker-libnetwork.
- bsc#1032287: Missing docker systemd configuration.
- bsc#1057743: New "symbol" for libnetwork requirement.
- bsc#1057743: Update secrets patch to handle "old" containers that have
orphaned secret data no longer available on the host.
- bsc#1055676: Update patches to correctly handle volumes and mounts when
Docker is running with user namespaces enabled.
- bsc#1045628:: Add patch to make the dm storage driver remove a
container's rootfs mountpoint before attempting to do libdm operations
on it. This helps avoid complications when live mounts will leak into
containers.
- bsc#1069758: Upgrade Docker to v17.09.1_ce (and obsolete
docker-image-migrator).
- bsc#1021227: bsc#1029320 bsc#1058173 -- Enable docker devicemapper
support for deferred removal/deletion within Containers module.
- bsc#1046024: Correct interaction between Docker and SuSEFirewall2, to
avoid breaking Docker networking after boot.
- bsc#1048046: Build with -buildmode=pie to make all binaries PIC.
- bsc#1072798: Remove dependency on obsolete bridge-utils.
- bsc#1064926: Set --start-timeout=2m by default to match upstream.
- bsc#1065109, bsc#1053532: Use the upstream makefile so that Docker can
get the commit ID in `docker info`.
Please note that the "docker-runc" package is just a rename of the old
"runc" package to match that we now ship the Docker fork of runc.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2018-273=1
- SUSE Linux Enterprise Module for Containers 12:
zypper in -t patch SUSE-SLE-Module-Containers-12-2018-273=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 6 (x86_64):
containerd-0.2.9+gitr706_06b9cb351610-16.8.1
containerd-debuginfo-0.2.9+gitr706_06b9cb351610-16.8.1
containerd-debugsource-0.2.9+gitr706_06b9cb351610-16.8.1
docker-17.09.1_ce-98.8.1
docker-debuginfo-17.09.1_ce-98.8.1
docker-debugsource-17.09.1_ce-98.8.1
docker-libnetwork-0.7.0.1+gitr2066_7b2b1feb1de4-10.1
docker-libnetwork-debuginfo-0.7.0.1+gitr2066_7b2b1feb1de4-10.1
docker-runc-1.0.0rc4+gitr3338_3f2f8b84a77f-1.3.1
golang-github-docker-libnetwork-debugsource-0.7.0.1+gitr2066_7b2b1feb1de4-10.1
- SUSE Linux Enterprise Module for Containers 12 (ppc64le s390x x86_64):
containerd-0.2.9+gitr706_06b9cb351610-16.8.1
containerd-debuginfo-0.2.9+gitr706_06b9cb351610-16.8.1
containerd-debugsource-0.2.9+gitr706_06b9cb351610-16.8.1
docker-17.09.1_ce-98.8.1
docker-debuginfo-17.09.1_ce-98.8.1
docker-debugsource-17.09.1_ce-98.8.1
docker-libnetwork-0.7.0.1+gitr2066_7b2b1feb1de4-10.1
docker-libnetwork-debuginfo-0.7.0.1+gitr2066_7b2b1feb1de4-10.1
docker-runc-1.0.0rc4+gitr3338_3f2f8b84a77f-1.3.1
golang-github-docker-libnetwork-debugsource-0.7.0.1+gitr2066_7b2b1feb1de4-10.1
References:
https://www.suse.com/security/cve/CVE-2017-14992.html
https://www.suse.com/security/cve/CVE-2017-16539.html
https://bugzilla.suse.com/1021227
https://bugzilla.suse.com/1029320
https://bugzilla.suse.com/1032287
https://bugzilla.suse.com/1045628
https://bugzilla.suse.com/1046024
https://bugzilla.suse.com/1048046
https://bugzilla.suse.com/1051429
https://bugzilla.suse.com/1053532
https://bugzilla.suse.com/1055676
https://bugzilla.suse.com/1057743
https://bugzilla.suse.com/1058173
https://bugzilla.suse.com/1059011
https://bugzilla.suse.com/1064926
https://bugzilla.suse.com/1065109
https://bugzilla.suse.com/1066210
https://bugzilla.suse.com/1066801
https://bugzilla.suse.com/1069468
https://bugzilla.suse.com/1069758
https://bugzilla.suse.com/1072798
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0383-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 07 Feb '18
by opensuse-security@opensuse.org 07 Feb '18
07 Feb '18
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0383-1
Rating: important
References: #1005778 #1005780 #1005781 #1012382 #1012917
#1015342 #1015343 #1019784 #1022476 #1022595
#1022912 #1024296 #1024376 #1031395 #1031492
#1031717 #1037838 #1038078 #1038085 #1040182
#1043652 #1048325 #1048585 #1053472 #1060279
#1062129 #1066163 #1066223 #1068032 #1068038
#1068569 #1068984 #1069138 #1069160 #1070052
#1070799 #1072163 #1072484 #1073229 #1073928
#1074134 #1074488 #1074621 #1074709 #1074839
#1074847 #1075066 #1075078 #1075087 #1075091
#1075397 #1075428 #1075617 #1075621 #1075627
#1075811 #1075994 #1076017 #1076110 #1076187
#1076232 #1076805 #1076847 #1076872 #1076899
#1077068 #1077560 #1077592 #1077704 #1077871
#1078002 #1078681 #963844 #966170 #966172
#973818 #985025
Cross-References: CVE-2017-15129 CVE-2017-17712 CVE-2017-17862
CVE-2017-17864 CVE-2017-18017 CVE-2017-5715
CVE-2018-1000004 CVE-2018-5332 CVE-2018-5333
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Live Patching 12-SP3
SUSE Linux Enterprise High Availability 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
SUSE CaaS Platform ALL
______________________________________________________________________________
An update that solves 9 vulnerabilities and has 68 fixes is
now available.
Description:
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.114 to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized
disclosure of information to an attacker with local user access via a
side-channel analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building
the Linux Kernel with return trampolines aka "retpolines".
- CVE-2017-15129: A use-after-free vulnerability was found in network
namespaces code affecting the Linux kernel in the function
get_net_ns_by_id() in net/core/net_namespace.c did not check for the
net::count value after it has found a peer network in netns_ids idr,
which could lead to double free and memory corruption. This
vulnerability could allow an unprivileged local user to induce kernel
memory corruption on the system, leading to a crash. Due to the nature
of the flaw, privilege escalation cannot be fully ruled out, although it
is thought to be unlikely (bnc#1074839).
- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the
Linux kernel has a race condition in inet->hdrincl that leads to
uninitialized stack pointer usage; this allowed a local user to execute
code and gain privileges (bnc#1073229).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignored
unreachable code, even though it would still be processed by JIT
compilers. This behavior, also considered an improper branch-pruning
logic issue, could possibly be used by local users for denial of service
(bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled
states_equal comparisons between the pointer data type and the
UNKNOWN_VALUE data type, which allowed local users to obtain potentially
sensitive address information, aka a "pointer leak (bnc#1073928).
- CVE-2017-18017: The tcpmss_mangle_packet function in
net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
to cause a denial of service (use-after-free and memory corruption) or
possibly have unspecified other impact by leveraging the presence of
xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
did not validate a value that is used during DMA page allocation,
leading to a heap-based out-of-bounds write (related to the
rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
net/rds/rdma.c mishandled cases where page pinning fails or an invalid
address is supplied, leading to an rds_atomic_free_op NULL pointer
dereference (bnc#1075617).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability
existed in the sound system, this can lead to a deadlock and denial of
service condition (bnc#1076017).
The following non-security bugs were fixed:
- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).
- acpi / scan: Prefer devices without _HID/_CID for _ADR matching
(bnc#1012382).
- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).
- af_key: fix buffer overread in verify_address_len() (bnc#1012382).
- afs: Adjust mode bits processing (bnc#1012382).
- afs: Connect up the CB.ProbeUuid (bnc#1012382).
- afs: Fix afs_kill_pages() (bnc#1012382).
- afs: Fix missing put_page() (bnc#1012382).
- afs: Fix page leak in afs_write_begin() (bnc#1012382).
- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).
- afs: Flush outstanding writes when an fd is closed (bnc#1012382).
- afs: Migrate vlocation fields to 64-bit (bnc#1012382).
- afs: Populate and use client modification time (bnc#1012382).
- afs: Populate group ID from vnode status (bnc#1012382).
- afs: Prevent callback expiry timer overflow (bnc#1012382).
- alpha: fix build failures (bnc#1012382).
- alsa: aloop: Fix inconsistent format due to incomplete rule
(bsc#1031717).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).
- alsa: aloop: Release cable upon open error path (bsc#1031717).
- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds
(bsc#1031717).
- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).
- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).
- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).
- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).
- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).
- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant
(bsc#1031717).
- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).
- alsa: hda - change the location for one mic on a Lenovo machine
(bsc#1031717).
- alsa: hda: Drop useless WARN_ON() (bsc#1031717).
- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).
- alsa: hda - fix headset mic detection issue on a Dell machine
(bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc274
(bsc#1031717).
- alsa: hda - Fix headset microphone detection for ASUS N551 and N751
(bsc#1031717).
- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).
- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).
- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).
- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).
- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).
- alsa: hda/realtek - Add default procedure for suspend and resume state
(bsc#1031717).
- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic
(bsc#1031717).
- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).
- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).
- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).
- alsa: hda/realtek - change the location for one of two front microphones
(bsc#1031717).
- alsa: hda/realtek - Enable jack detection function for Intel ALC700
(bsc#1031717).
- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).
- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).
- alsa: hda/realtek - Fix headset and mic on several Asus laptops with
ALC256 (bsc#1031717).
- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV
(bsc#1031717).
- alsa: hda/realtek - fix headset mic detection for MSI MS-B120
(bsc#1031717).
- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255
(bsc#1031717).
- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).
- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE
(bsc#1031717).
- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).
- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289
(bsc#1031717).
- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).
- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).
- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).
- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).
- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).
- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294
(bsc#1031717).
- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294
(bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).
- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops
(bsc#1031717).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder
(bsc#1031717).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops
(bsc#1031717).
- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).
- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).
- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).
- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).
- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).
- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU
(bsc#1031717).
- arc: uaccess: dont use "l" gcc inline asm constraint modifier
(bnc#1012382).
- arm64: Add skeleton to harden the branch predictor against aliasing
attacks (bsc#1068032).
- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).
- arm64: Branch predictor hardening for Cavium ThunderX2 (bsc#1068032).
- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).
- arm64: cpufeature: Pass capability structure to ->enable callback
(bsc#1068032).
- arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs (bsc#1068032).
- arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75
(bsc#1068032).
- arm64: debug: remove unused local_dbg_{enable, disable} macros
(bsc#1068032).
- arm64: Define cputype macros for Falkor CPU (bsc#1068032).
- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).
- arm64: Do not force KPTI for CPUs that are not vulnerable (bsc#1076187).
- arm64: do not pull uaccess.h into *.S (bsc#1068032).
- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: entry: Add exception trampoline page for exceptions from EL0
(bsc#1068032).
- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
(bsc#1068032).
- arm64: entry: Explicitly pass exception level to kernel_ventry macro
(bsc#1068032).
- arm64: entry: Hook up entry trampoline to exception vectors
(bsc#1068032).
- arm64: entry: remove pointless SPSR mode check (bsc#1068032).
- arm64: entry.S convert el0_sync (bsc#1068032).
- arm64: entry.S: convert el1_sync (bsc#1068032).
- arm64: entry.S: convert elX_irq (bsc#1068032).
- arm64: entry.S: move SError handling into a C function for future
expansion (bsc#1068032).
- arm64: entry.S: Remove disable_dbg (bsc#1068032).
- arm64: erratum: Work around Falkor erratum #E1003 in trampoline code
(bsc#1068032).
- arm64: explicitly mask all exceptions (bsc#1068032).
- arm64: factor out entry stack manipulation (bsc#1068032).
- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).
- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros
(bsc#1068032).
- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm
macro (bsc#1068032).
- arm64: factor work_pending state machine to C (bsc#1068032).
- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).
- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).
- arm64: Handle faults caused by inadvertent user access with PAN enabled
(bsc#1068032).
- arm64: head.S: get rid of x25 and x26 with 'global' scope (bsc#1068032).
- arm64: Implement branch predictor hardening for affected Cortex-A CPUs
(bsc#1068032).
- arm64: Implement branch predictor hardening for Falkor (bsc#1068032).
- arm64: Initialise high_memory global variable earlier (bnc#1012382).
- arm64: introduce an order for exceptions (bsc#1068032).
- arm64: introduce mov_q macro to move a constant into a 64-bit register
(bsc#1068032).
- arm64: Introduce uaccess_{disable,enable} functionality based on
TTBR0_EL1 (bsc#1068032).
- arm64: kaslr: Put kernel vectors address in separate data page
(bsc#1068032).
- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).
- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).
- arm64: kill ESR_LNX_EXEC (bsc#1068032).
- arm64: kpti: Fix the interaction between ASID switching and software PAN
(bsc#1068032).
- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls
(bsc#1076232).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm64: kvm: Make PSCI_VERSION a fast path (bsc#1068032).
- arm64: kvm: Use per-CPU vector when BP hardening is enabled
(bsc#1068032).
- arm64: Mask all exceptions during kernel_exit (bsc#1068032).
- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).
- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).
- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: hardcode rodata=true (bsc#1068032).
- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR
(bsc#1068032).
- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI
(bsc#1068032).
- arm64: mm: Map entry trampoline into trampoline and kernel page tables
(bsc#1068032).
- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).
- arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003
(bsc#1068032).
- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).
- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).
- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).
- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).
- arm64: Move the async/fiq helpers to explicitly set process context
flags (bsc#1068032).
- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to
init_mm (bsc#1068032).
- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).
- arm64: swp emulation: bound LL/SC retries before rescheduling
(bsc#1068032).
- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg
(bsc#1068032).
- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).
- arm64: thunderx2: remove branch predictor hardening References:
bsc#1076232 This causes undefined instruction abort on the smc call from
guest kernel. Disable until kvm is fixed.
- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
(bsc#1068032).
- arm64: Turn on KPTI only on CPUs that need it (bsc#1076187).
- arm64: use alternative auto-nop (bsc#1068032).
- arm64: use RET instruction for exiting the trampoline (bsc#1068032).
- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).
- arm/arm64: kvm: Make default HYP mappings non-excutable (bsc#1068032).
- arm: avoid faulting on qemu (bnc#1012382).
- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).
- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).
- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed
memory (bnc#1012382).
- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).
- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7
(bnc#1012382).
- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio
(bnc#1012382).
- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).
- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).
- arm: kprobes: Fix the return address of multiple kretprobes
(bnc#1012382).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).
- arm: OMAP2+: Fix device node reference counts (bnc#1012382).
- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure
(bnc#1012382).
- arm: OMAP2+: Release device node after it is no longer needed
(bnc#1012382).
- asm-prototypes: Clear any CPP defines before declaring the functions
(git-fixes).
- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).
- asn.1: fix out-of-bounds read when parsing indefinite length item
(bnc#1012382).
- asoc: fsl_ssi: AC'97 ops need regmap, clock and cleaning up on failure
(bsc#1031717).
- asoc: twl4030: fix child-node lookup (bsc#1031717).
- asoc: wm_adsp: Fix validation of firmware and coeff lengths
(bsc#1031717).
- ath9k: fix tx99 potential info leak (bnc#1012382).
- atm: horizon: Fix irq release error (bnc#1012382).
- audit: ensure that 'audit=1' actually enables audit for PID 1
(bnc#1012382).
- axonram: Fix gendisk handling (bnc#1012382).
- backlight: pwm_bl: Fix overflow condition (bnc#1012382).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: bch_allocator_thread() is not freezable (bsc#1076110).
- bcache: bch_writeback_thread() is not freezable (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment
notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API
(bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bnc#1012382).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: Fix building error on MIPS (bnc#1012382).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bnc#1012382).
- bcache: gc does not work when triggering by manual command (bsc#1076110,
bsc#1038078).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean
(bnc#1012382 bsc#1043652).
- bcache: partition support: add 16 minors per bcacheN device
(bsc#1076110, bsc#1019784).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bnc#1012382
bsc#1043652).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: update bio->bi_opf bypass/writeback REQ_ flag hints
(bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up()
(bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- be2net: restore properly promisc mode after queues reconfiguration
(bsc#963844 FATE#320192).
- block: wake up all tasks blocked in get_request() (bnc#1012382).
- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).
- bnx2x: do not rollback VF MAC/VLAN filters we did not configure
(bnc#1012382).
- bnx2x: fix possible overrun of VFPF multicast addresses array
(bnc#1012382).
- bnx2x: prevent crash when accessing PTP with interface down
(bnc#1012382).
- btrfs: add missing memset while reading compressed inline extents
(bnc#1012382).
- btrfs: clear space cache inode generation always (bnc#1012382).
- btrfs: embed extent_changeset::range_changed to the structure (dependent
patch, bsc#1031395).
- btrfs: qgroup: Fix qgroup reserved space underflow by only freeing
reserved ranges (bsc#1031395).
- btrfs: qgroup: Fix qgroup reserved space underflow caused by buffered
write and quotas being enabled (bsc#1031395).
- btrfs: qgroup: Introduce extent changeset for qgroup reserve functions
(dependent patch, bsc#1031395).
- btrfs: qgroup: Return actually freed bytes for qgroup release or free
data (bsc#1031395).
- btrfs: qgroup-test: Fix backport error in qgroup selftest (just to make
CONFIG_BTRFS_FS_RUN_SANITY_TESTS pass compile).
- btrfs: ulist: make the finalization function public (dependent patch,
bsc#1031395).
- btrfs: ulist: rename ulist_fini to ulist_release (dependent patch,
bsc#1031395).
- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once
(bnc#1012382).
- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: gs_usb: fix return value of the "set_bittiming" callback
(bnc#1012382).
- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback()
(bnc#1012382).
- can: kvaser_usb: free buf in error paths (bnc#1012382).
- can: kvaser_usb: ratelimit errors if incomplete messages are received
(bnc#1012382).
- can: peak: fix potential bug in packet fragmentation (bnc#1012382).
- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).
- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- ceph: more accurate statfs (bsc#1077068).
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o
VPU (bnc#1012382).
- clk: mediatek: add the option for determining PLL source clock
(bnc#1012382).
- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).
- config: arm64: enable HARDEN_BRANCH_PREDICTOR
- config: arm64: enable UNMAP_KERNEL_AT_EL0
- cpuidle: fix broadcast control when broadcast can not be entered
(bnc#1012382).
- cpuidle: powernv: Pass correct drv->cpumask for registration
(bnc#1012382).
- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).
- crypto: algapi - fix NULL dereference in crypto_remove_spawns()
(bnc#1012382).
- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).
- crypto: chelsio - select CRYPTO_GF128MUL (bsc#1048325).
- crypto: crypto4xx - increase context and scatter ring buffer elements
(bnc#1012382).
- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex
(bnc#1012382).
- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).
- crypto: n2 - cure use after free (bnc#1012382).
- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).
- crypto: s5p-sss - Fix completing crypto request in IRQ handler
(bnc#1012382).
- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).
- cxl: Check if vphb exists before iterating over AFU devices
(bsc#1066223).
- dax: Pass detailed error code from __dax_fault() (bsc#1072484).
- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state
(bnc#1012382).
- delay: add poll_event_interruptible (bsc#1048585).
- dlm: fix malfunction of dlm_tool caused by debugfs changes (bsc#1077704).
- dmaengine: dmatest: move callback wait queue to thread context
(bnc#1012382).
- dmaengine: Fix array index out of bounds warning in __get_unmap_pool()
(bnc#1012382).
- dmaengine: pl330: fix double lock (bnc#1012382).
- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type
(bnc#1012382).
- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).
- dm bufio: fix shrinker scans when (nr_to_scan < retain_target)
(bnc#1012382).
- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).
- drivers/firmware: Expose psci_get_version through psci_ops structure
(bsc#1068032).
- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).
- drm: extra printk() wrapper macros (bnc#1012382).
- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement
(bnc#1012382).
- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU
(bnc#1012382).
- drm/omap: fix dmabuf mmap for dma_alloc'ed buffers (bnc#1012382).
- drm/radeon: fix atombios on big endian (bnc#1012382).
- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).
- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).
- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).
- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE
instead of 0 (bnc#1012382).
- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).
- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).
- edac, sb_edac: Fix missing break in switch (bnc#1012382).
- eeprom: at24: check at24_read/write arguments (bnc#1012382).
- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).
- efi: Move some sysfs files to be read-only by root (bnc#1012382).
- eventpoll.h: add missing epoll event masks (bnc#1012382).
- ext4: fix crash when a directory's i_size is too small (bnc#1012382).
- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).
- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).
- fbdev: controlfb: Add missing modes to fix out of bounds access
(bnc#1012382).
- Fix EX_SIZE. We do not have the patches that shave off parts of the
exception data.
- Fix mishandling of cases with MSR not being present (writing to MSR even
though _state == -1).
- Fix return value from ib[rs|pb]_enabled()
- Fixup hang when calling 'nvme list' on all paths down (bsc#1070052).
- fjes: Fix wrong netdevice feature flags (bnc#1012382).
- flow_dissector: properly cap thoff field (bnc#1012382).
- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).
- fork: clear thread stack upon allocation (bsc#1077560).
- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).
- futex: Prevent overflow by strengthen input validation (bnc#1012382).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- gfs2: Take inode off order_write list when setting jdata flag
(bnc#1012382).
- gpio: altera: Use handle_level_irq when configured as a level_high
(bnc#1012382).
- hid: chicony: Add support for another ASUS Zen AiO keyboard
(bnc#1012382).
- hid: xinmo: fix for out of range for THT 2P arcade controller
(bnc#1012382).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).
- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).
- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).
- i40iw: Account for IPv6 header when setting MSS (bsc#1024376
FATE#321249).
- i40iw: Allocate a sdbuf per CQP WQE (bsc#1024376 FATE#321249).
- i40iw: Cleanup AE processing (bsc#1024376 FATE#321249).
- i40iw: Clear CQP Head/Tail during initialization (bsc#1024376
FATE#321249).
- i40iw: Correct ARP index mask (bsc#1024376 FATE#321249).
- i40iw: Do not allow posting WR after QP is flushed (bsc#1024376
FATE#321249).
- i40iw: Do not free sqbuf when event is I40IW_TIMER_TYPE_CLOSE
(bsc#1024376 FATE#321249).
- i40iw: Do not generate CQE for RTR on QP flush (bsc#1024376 FATE#321249).
- i40iw: Do not retransmit MPA request after it is ACKed (bsc#1024376
FATE#321249).
- i40iw: Fixes for static checker warnings (bsc#1024376 FATE#321249).
- i40iw: Ignore AE source field in AEQE for some AEs (bsc#1024376
FATE#321249).
- i40iw: Move cqp_cmd_head init to CQP initialization (bsc#1024376
FATE#321249).
- i40iw: Move exception_lan_queue to VSI structure (bsc#1024376
FATE#321249).
- i40iw: Move MPA request event for loopback after connect (bsc#1024376
FATE#321249).
- i40iw: Notify user of established connection after QP in RTS
(bsc#1024376 FATE#321249).
- i40iw: Reinitialize IEQ on MTU change (bsc#1024376 FATE#321249).
- ib/hfi1: Fix misspelling in comment (bsc#973818, fate#319242).
- ib/hfi1: Prevent kernel QP post send hard lockups (bsc#973818
FATE#319242).
- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush
(git-fixes).
- ib/ipoib: Fix race condition in neigh creation (bsc#1022595 FATE#322350).
- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop
(bnc#1012382).
- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).
- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).
- ib/mlx5: Serialize access to the VMA list (bsc#1015342 FATE#321688
bsc#1015343 FATE#321689).
- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).
- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).
- ibmvnic: Fix IP offload control buffer (bsc#1076899).
- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).
- ibmvnic: Fix pending MAC address changes (bsc#1075627).
- ibmvnic: Modify buffer size and number of queues on failover
(bsc#1076872).
- ibmvnic: Revert to previous mtu when unsupported value requested
(bsc#1076872).
- ibmvnic: Wait for device response when changing MAC (bsc#1078681).
- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (bsc#973818,
fate#319242).
- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).
- ib/srpt: Fix ACL lookup during login (bsc#1024296 FATE#321265).
- ib/uverbs: Fix command checking as part of ib_uverbs_ex_modify_qp()
(FATE#321231 FATE#321473 FATE#322153 FATE#322149).
- igb: check memory allocation failure (bnc#1012382).
- ima: fix hash algorithm initialization (bnc#1012382).
- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).
- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).
- input: elantech - add new icbody type 15 (bnc#1012382).
- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list
(bnc#1012382).
- input: trackpoint - force 3 buttons if 0 button is reported
(bnc#1012382).
- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).
- input: twl6040-vibra - fix child-node lookup (bnc#1012382).
- input: twl6040-vibra - fix DT node memory management (bnc#1012382).
- intel_th: pci: Add Gemini Lake support (bnc#1012382).
- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).
- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).
- ip6_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912
FATE#321246).
- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).
- ip_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912
FATE#321246).
- ipmi: Stop timers before cleaning up the module (bnc#1012382).
- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).
- ipv4: igmp: guard against silly MTU values (bnc#1012382).
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be
INADDR_ANY (bnc#1012382).
- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL
(bnc#1012382).
- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).
- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).
- ipv6: mcast: better catch silly mtu values (bnc#1012382).
- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).
- ipvlan: fix ipv6 outbound device (bnc#1012382).
- ipvlan: remove excessive packet scrubbing (bsc#1070799).
- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).
- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).
- iscsi_iser: Re-enable 'iser_pi_guard' module parameter (bsc#1062129).
- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).
- iscsi-target: Make TASK_REASSIGN use proper se_cmd->cmd_kref
(bnc#1012382).
- isdn: kcapi: avoid uninitialized data (bnc#1012382).
- iser-target: Fix possible use-after-free in connection establishment
error (FATE#321732).
- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).
- iw_cxgb4: reflect the original WR opcode in drain cqes (bsc#321658
FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- iw_cxgb4: when flushing, complete all wrs in a chain (bsc#321658
FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- ixgbe: fix use of uninitialized padding (bnc#1012382).
- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi: Keep KVM stable after enable s390 wire up bpb feature
(bsc#1076805).
- kABI: protect struct bpf_map (kabi).
- kABI: protect struct ipv6_pinfo (kabi).
- kABI: protect struct t10_alua_tg_pt_gp (kabi).
- kABI: protect struct usbip_device (kabi).
- kabi/severities: arm64: ignore cpu capability array
- kabi/severities: do not care about stuff_RSB
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kbuild: add '-fno-stack-check' to kernel build options (bnc#1012382).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621
bsc#1068032).
- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).
- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).
- kernel/acct.c: fix the acct->needcheck check in check_free_space()
(bnc#1012382).
- kernel: make groups_sort calling a responsibility group_info allocators
(bnc#1012382).
- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from
!sig_kernel_only() signals (bnc#1012382).
- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL
(bnc#1012382).
- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in
complete_signal() (bnc#1012382).
- keys: add missing permission check for request_key() destination
(bnc#1012382).
- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).
- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).
- kpti: Report when enabled (bnc#1012382).
- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).
- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset
(bnc#1012382).
- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).
- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables
(bnc#1012382).
- kvm: s390: Enable all facility bits that are known good for passthrough
(bsc#1076805).
- kvm: s390: wire up bpb feature (bsc#1076805).
- kvm: VMX: Fix enable VPID conditions (bnc#1012382).
- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).
- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382 bsc#1068032).
- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).
- kvm: x86: correct async page present tracepoint (bnc#1012382).
- kvm: x86: Exit to user-mode on #UD intercept when emulator requires
(bnc#1012382).
- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).
- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).
- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).
- kvm: x86: pvclock: Handle first-time write to pvclock-page contains
random junk (bnc#1012382).
- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).
- lan78xx: Fix failure in USB Full Speed (bnc#1012382).
- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
(bnc#1012382).
- libata: drop WARN from protocol error in ata_sff_qc_issue()
(bnc#1012382).
- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).
- macvlan: Only deliver one copy of the frame to the macvlan interface
(bnc#1012382).
- md: more open-coded offset_in_page() (bsc#1076110).
- media: dvb: i2c transfers over usb cannot be done from stack
(bnc#1012382).
- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).
- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).
- mfd: twl6040: Fix child-node lookup (bnc#1012382).
- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).
- mlxsw: reg: Fix SPVM max record count (bnc#1012382).
- mm: avoid returning VM_FAULT_RETRY from ->page_mkwrite handlers
(bnc#1012382).
- mmc: core: Do not leave the block driver in a suspended state
(bnc#1012382).
- mmc: mediatek: Fixed bug where clock frequency could be set wrong
(bnc#1012382).
- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).
- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).
- mm/mprotect: add a cond_resched() inside change_pmd_range()
(bnc#1077871, bnc#1078002).
- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP
(bnc#1012382).
- module: Add retpoline tag to VERMAGIC (bnc#1012382).
- module: set __jump_table alignment to 8 (bnc#1012382).
- more bio_map_user_iov() leak fixes (bnc#1012382).
- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).
- net: Allow neigh contructor functions ability to modify the primary_key
(bnc#1012382).
- net/appletalk: Fix kernel memory disclosure (bnc#1012382).
- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).
- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values
(bnc#1012382).
- net: bcmgenet: power down internal phy if open or resume fails
(bnc#1012382).
- net: bcmgenet: Power up the internal PHY before probing the MII
(bnc#1012382).
- net: bcmgenet: reserved phy revisions must be checked first
(bnc#1012382).
- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink
leaks (bnc#1012382).
- net: core: fix module type in sock_diag_bind (bnc#1012382).
- net: Do not allow negative values for busy_read and busy_poll sysctl
interfaces (bnc#1012382).
- net: fec: fix multicast filtering hardware setup (bnc#1012382).
- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).
- netfilter: do not track fragmented packets (bnc#1012382).
- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).
- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).
- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).
- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash
table (bnc#1012382).
- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).
- netfilter: nfnl_cthelper: fix runtime expectation policy updates
(bnc#1012382).
- net: Fix double free and memory corruption in get_net_ns_by_id()
(bnc#1012382).
- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).
- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).
- net: initialize msg.msg_flags in recvfrom (bnc#1012382).
- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).
- netlink: add a start callback for starting a netlink dump (bnc#1012382).
- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y
(bnc#1012382).
- net/mlx5: Avoid NULL pointer dereference on steering cleanup
(bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Cleanup IRQs in case of unload failure (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net/mlx5e: Add refcount to VXLAN structure (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net/mlx5e: Fix ETS BW check (bsc#966170 FATE#320225 bsc#966172
FATE#320226).
- net/mlx5e: Fix features check of IPv6 traffic (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net/mlx5e: Fix fixpoint divide exception in mlx5e_am_stats_compare
(bsc#1015342).
- net/mlx5e: Fix possible deadlock of VXLAN lock (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net/mlx5e: Prevent possible races in VXLAN control flow (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix error flow in CREATE_QP command (bsc#1015342 FATE#321688
bsc#1015343 FATE#321689).
- net/mlx5: Fix rate limit packet pacing naming and struct (bsc#1015342
FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Stay in polling mode when command EQ destroy fails (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).
- net: mvneta: clear interface link status on port disable (bnc#1012382).
- net: mvneta: eliminate wrong call to handle rx descriptor error
(fate#319899).
- net: mvneta: use proper rxq_number in loop on rx queues (fate#319899).
- net/packet: fix a race in packet_bind() and packet_notifier()
(bnc#1012382).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).
- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg
workaround (bnc#1012382).
- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).
- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).
- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4
(bnc#1012382).
- net: reevalulate autoflowlabel setting after sysctl setting
(bnc#1012382).
- net: Resend IGMP memberships upon peer notification (bnc#1012382).
- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).
- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).
- net: systemport: Pad packet before inserting TSB (bnc#1012382).
- net: systemport: Utilize skb_put_padto() (bnc#1012382).
- net: tcp: close sock if net namespace is exiting (bnc#1012382).
- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).
- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).
- nfsd: Fix another OPEN stateid race (bnc#1012382).
- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).
- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).
- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).
- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).
- nfs: Do not take a reference on fl->fl_file for LOCK operation
(bnc#1012382).
- nfs: Fix a typo in nfs_rename() (bnc#1012382).
- nfs: improve shinking of access cache (bsc#1012917).
- nfsv4.1 respect server's max size in CREATE_SESSION (bnc#1012382).
- nfsv4: Fix client recovery when server reboots multiple times
(bnc#1012382).
- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick()
(bnc#1012382).
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
(bnc#1012382).
- nvme_fc: correct hang in nvme_ns_remove() (bsc#1075811).
- nvme_fc: fix rogue admin cmds stalling teardown (bsc#1075811).
- nvme-pci: Remove watchdog timer (bsc#1066163).
- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).
- packet: fix crash in fanout_demux_rollover() (bnc#1012382).
- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel
(bnc#1012382).
- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).
- partially revert tipc improve link resiliency when rps is activated
(bsc#1068038).
- pci/AER: Report non-fatal errors only to the affected endpoint
(bnc#1012382).
- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).
- pci: Create SR-IOV virtfn/physfn links before attaching driver
(bnc#1012382).
- pci: Detach driver before procfs & sysfs teardown on device remove
(bnc#1012382).
- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).
- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).
- perf symbols: Fix symbols__fixup_end heuristic for corner cases
(bnc#1012382).
- perf test attr: Fix ignored test case result (bnc#1012382).
- phy: work around 'phys' references to usb-nop-xceiv devices
(bnc#1012382).
- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).
- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).
- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid
(bsc#1068032, bsc#1075087).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas
(bsc#1068032, bsc#1075087).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032,
bsc#1075087).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,
bsc#1075087).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL
(bsc#1068032, bsc#1075087).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti
(bsc#1068032, bsc#1075087).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032,
bsc#1075087).
- powerpc/ipic: Fix status get and status clear (bnc#1012382).
- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).
- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).
- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032,
bsc#1075087).
- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo
(bnc#1012382).
- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested
(bnc#1012382).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032,
bsc#1075087).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032,
bsc#1075087).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,
bsc#1075087).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,
bsc#1075087).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032,
bsc#1075087).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI)
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code
(bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: prevent crash when changing flush type to fallback
after system boot (bsc#1068032, bsc#1075087).
- ppp: Destroy the mutex when cleanup (bnc#1012382).
- pppoe: take ->needed_headroom of lower device into account on xmit
(bnc#1012382).
- pti: unbreak EFI (bsc#1074709).
- r8152: fix the list rx_done may be used without initialization
(bnc#1012382).
- r8152: prevent the driver from transmitting packets with carrier off
(bnc#1012382).
- r8169: fix memory corruption on retrieval of hardware statistics
(bnc#1012382).
- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).
- ravb: Remove Rx overflow log messages (bnc#1012382).
- rbd: set max_segments to USHRT_MAX (bnc#1012382).
- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).
- rdma/i40iw: Remove MSS change support (bsc#1024376 FATE#321249).
- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).
- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).
- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).
- Re-enable fixup detection by CPU type in case hypervisor call fails.
- regulator: core: Rely on regulator_dev_release to free constraints
(bsc#1074847).
- regulator: da9063: Return an error code on probe failure (bsc#1074847).
- regulator: pwm: Fix regulator ramp delay for continuous mode
(bsc#1074847).
- regulator: Try to resolve regulators supplies on registration
(bsc#1074847).
- Revert "Bluetooth: btusb: driver to enable the usb-wakeup feature"
(bnc#1012382).
- Revert "drm/armada: Fix compile fail" (bnc#1012382).
- Revert "drm/radeon: dont switch vt on suspend" (bnc#1012382).
- Revert "ipsec: Fix aborted xfrm policy dump crash" (kabi).
- Revert "kaiser: vmstat show NR_KAISERTABLE as nr_overhead" (kabi).
- Revert "lib/genalloc.c: make the avail variable an atomic_long_t" (kabi).
- Revert "module: Add retpoline tag to VERMAGIC" (bnc#1012382 kabi).
- Revert "module: Add retpoline tag to VERMAGIC" (kabi).
- Revert "netlink: add a start callback for starting a netlink dump"
(kabi).
- Revert "ocfs2: should wait dio before inode lock in ocfs2_setattr()"
(bnc#1012382).
- Revert "Re-enable fixup detection by CPU type in case hypervisor call
fails." The firmware update is required for the existing instructions to
also do the cache flush.
- Revert "s390/kbuild: enable modversions for symbols exported from asm"
(bnc#1012382).
- Revert "sched/deadline: Use the revised wakeup rule for suspending
constrained dl tasks" (kabi).
- Revert "scsi: libsas: align sata_device's rps_resp on a cacheline"
(kabi).
- Revert "spi: SPI_FSL_DSPI should depend on HAS_DMA" (bnc#1012382).
- Revert "userfaultfd: selftest: vm: allow to build in vm/ directory"
(bnc#1012382).
- Revert "x86/efi: Build our own page table structures" (bnc#1012382).
- Revert "x86/efi: Hoist page table switching code into efi_call_virt()"
(bnc#1012382).
- Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"
(bnc#1012382).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).
- ring-buffer: Mask out the info bits when returning buffer page length
(bnc#1012382).
- route: also update fnhe_genid when updating a route cache (bnc#1012382).
- route: update fnhe_expires for redirect when the fnhe exists
(bnc#1012382).
- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).
- rtc: pcf8563: fix output clock rate (bnc#1012382).
- rtc: pl031: make interrupt optional (bnc#1012382).
- rtc: set the alarm to the next expiring timer (bnc#1012382).
- s390: always save and restore all registers on context switch
(bnc#1012382).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847,
LTC#163740).
- s390: fix compat system call table (bnc#1012382).
- s390/pci: do not require AIS facility (bnc#1012382).
- s390/qeth: no ETH header for outbound AF_IUCV (LTC#156276 bnc#1012382
bnc#1053472).
- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).
- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).
- sched/deadline: Make sure the replenishment timer fires in the next
period (bnc#1012382).
- sched/deadline: Throttle a constrained deadline task activated after the
deadline (bnc#1012382).
- sched/deadline: Use deadline instead of period when calculating overflow
(bnc#1012382).
- sched/deadline: Use the revised wakeup rule for suspending constrained
dl tasks (bnc#1012382).
- sched/deadline: Zero out positive runtime after throttling constrained
tasks (git-fixes).
- sched/rt: Do not pull from current CPU if only one CPU to pull
(bnc#1022476).
- scsi: bfa: integer overflow in debugfs (bnc#1012382).
- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).
- scsi: handle ABORTED_COMMAND on Fujitsu ETERNUS (bsc#1069138).
- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading
(bnc#1012382).
- scsi: hpsa: destroy sas transport properties before scsi_host
(bnc#1012382).
- scsi: libsas: align sata_device's rps_resp on a cacheline (bnc#1012382).
- scsi: lpfc: Use after free in lpfc_rq_buf_free() (bsc#1037838).
- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1
volume created on two SATA drive (bnc#1012382).
- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).
- scsi: sd: change manage_start_stop to bool in sysfs interface
(bnc#1012382).
- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- sctp: do not allow the v4 socket to bind a v4mapped v6 address
(bnc#1012382).
- sctp: do not free asoc when it is already dead in sctp_sendmsg
(bnc#1012382).
- sctp: Replace use of sockets_allocated with specified macro
(bnc#1012382).
- sctp: return error if the asoc has been peeled off in
sctp_wait_for_sndbuf (bnc#1012382).
- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).
- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).
- selftests/x86: Add test_vsyscall (bnc#1012382).
- selftests/x86/ldt_get: Add a few additional tests for limits
(bnc#1012382).
- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).
- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).
- series.conf: move core networking (including netfilter) into sorted
section
- series.conf: whitespace cleanup
- Set supported_modules_check 1 (bsc#1072163).
- sfc: do not warn on successful change of MAC (bnc#1012382).
- sh_eth: fix SH7757 GEther initialization (bnc#1012382).
- sh_eth: fix TSU resource handling (bnc#1012382).
- sit: update frag_off info (bnc#1012382).
- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).
- sparc64/mm: set fields in deferred pages (bnc#1012382).
- spi_ks8995: fix "BUG: key accdaa28 not in .data!" (bnc#1012382).
- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).
- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).
- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
(bnc#1012382).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).
- sunrpc: replace generic auth_cred hash with auth-specific function
(bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- sysrq : fix Show Regs call trace on ARM (bnc#1012382).
- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK
(bnc#1012382).
- target/file: Do not return error for UNMAP if length is zero
(bnc#1012382).
- target: fix ALUA transition timeout handling (bnc#1012382).
- target:fix condition return in core_pr_dump_initiator_port()
(bnc#1012382).
- target: fix race during implicit transition work flushes (bnc#1012382).
- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd()
(bnc#1012382).
- target: Use system workqueue for ALUA transitions (bnc#1012382).
- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).
- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).
- tcp md5sig: Use skb's saddr when replying to an incoming segment
(bnc#1012382).
- tcp: __tcp_hdrlen() helper (bnc#1012382).
- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).
- thermal/drivers/step_wise: Fix temperature regulation misbehavior
(bnc#1012382).
- thermal: hisilicon: Handle return value of clk_prepare_enable
(bnc#1012382).
- tipc: fix cleanup at module unload (bnc#1012382).
- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).
- tipc: improve link resiliency when rps is activated (bsc#1068038).
- tracing: Allocate mask_str buffer dynamically (bnc#1012382).
- tracing: Fix converting enum's from the map in trace_event_eval_update()
(bnc#1012382).
- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).
- tracing: Fix possible double free on failure of allocating trace buffer
(bnc#1012382).
- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).
- tty fix oops when rmmod 8250 (bnc#1012382).
- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).
- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).
- udf: Avoid overflow when session starts at large offset (bnc#1012382).
- um: link vmlinux with -no-pie (bnc#1012382).
- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).
- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).
- usb: core: Add type-specific length check of BOS descriptors
(bnc#1012382).
- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).
- usb: devio: Prevent integer overflow in proc_do_submiturb()
(bnc#1012382).
- usb: Fix off by one in type-specific length check of BOS SSP capability
(git-fixes).
- usb: fix usbmon BUG trigger (bnc#1012382).
- usb: gadget: configs: plug memory leak (bnc#1012382).
- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping
(bnc#1012382).
- usb: gadgetfs: Fix a potential memory leak in 'dev_config()'
(bnc#1012382).
- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed
(bnc#1012382).
- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).
- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).
- usb: Increase usbfs transfer limit (bnc#1012382).
- usbip: Fix implicit fallthrough warning (bnc#1012382).
- usbip: Fix potential format overflow in userspace tools (bnc#1012382).
- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).
- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input
(bnc#1012382).
- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer
(bnc#1012382).
- usbip: fix usbip bind writing random string after command in match_busid
(bnc#1012382).
- usbip: prevent leaking socket pointer address in messages (bnc#1012382).
- usbip: prevent vhci_hcd driver from leaking a socket pointer address
(bnc#1012382).
- usbip: remove kernel addresses from usb device and urb debug msgs
(bnc#1012382).
- usbip: stub: stop printing kernel pointer addresses in messages
(bnc#1012382).
- usbip: vhci: stop printing kernel pointer addresses in messages
(bnc#1012382).
- usb: misc: usb3503: make sure reset is low for at least 100us
(bnc#1012382).
- usb: musb: da8xx: fix babble condition handling (bnc#1012382).
- usb: phy: isp1301: Add OF device ID table (bnc#1012382).
- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled
(git-fixes).
- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).
- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub
(bnc#1012382).
- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ
(bnc#1012382).
- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).
- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).
- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).
- usb: serial: option: add Quectel BG96 id (bnc#1012382).
- usb: serial: option: add support for Telit ME910 PID 0x1101
(bnc#1012382).
- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).
- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID
(bnc#1012382).
- usb: usbfs: Filter flags passed in from user space (bnc#1012382).
- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).
- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).
- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).
- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).
- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).
- video: fbdev: au1200fb: Release some resources if a memory allocation
fails (bnc#1012382).
- video: fbdev: au1200fb: Return an error code if a memory allocation
fails (bnc#1012382).
- virtio: release virtio index when fail to device_register (bnc#1012382).
- vmxnet3: repair memory leak (bnc#1012382).
- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).
- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend
(bnc#1012382).
- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).
- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).
- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq
(bnc#1012382).
- writeback: fix memory leak in wb_queue_work() (bnc#1012382).
- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).
- x509: fix printing uninitialized stack memory when OID is empty
(bsc#1075078).
- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).
- x86/acpi: Handle SCI interrupts above legacy space gracefully
(bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq()
(bsc#1068984).
- x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
(bnc#1012382).
- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).
- x86/apic/vector: Fix off by one in error path (bnc#1012382).
- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels
(bnc#1012382).
- x86/boot: Fix early command-line parsing when matching at end
(bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#985025).
- x86/cpu: Rename "WESTMERE2" family to "NEHALEM_G" (bsc#985025).
- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).
- x86/Documentation: Add PTI description (bnc#1012382).
- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).
- x86/efi: Build our own page table structures (fate#320512).
- x86/efi: Hoist page table switching code into efi_call_virt()
(fate#320512).
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
(bnc#1012382).
- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).
- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).
- x86/kasan: Write protect kasan zero shadow (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check
(bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading with a revision check
(bnc#1012382).
- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
(git-fixes).
- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).
- x86/mm/pat: Ensure cpa->pfn only contains page frame numbers
(fate#320588).
- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).
- x86/pti: Document fix wrong index (bnc#1012382).
- x86/pti/efi: broken conversion from efi to kernel page table
(bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active
(bsc#1068032).
- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994
bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).
- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly()
(bnc#1012382).
- xen-netfront: avoid crashing on resume after a failure in
talk_to_netback() (bnc#1012382).
- xen-netfront: Improve error handling during initialization (bnc#1012382).
- xfrm: Copy policy family in clone_policy (bnc#1012382).
- xfs: add configurable error support to metadata buffers (bsc#1068569).
- xfs: add configuration handlers for specific errors (bsc#1068569).
- xfs: add configuration of error failure speed (bsc#1068569).
- xfs: add "fail at unmount" error handling configuration (bsc#1068569).
- xfs: Add infrastructure needed for error propagation during buffer IO
failure (bsc#1068569).
- xfs: address kabi for xfs buffer retry infrastructure (kabi).
- xfs: configurable error behavior via sysfs (bsc#1068569).
- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real
(bnc#1012382).
- xfs: fix log block underflow during recovery cycle verification
(bnc#1012382).
- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).
- xfs: introduce metadata IO error class (bsc#1068569).
- xfs: introduce table-based init for error behaviors (bsc#1068569).
- xfs: Properly retry failed inode items in case of error during buffer
writeback (bsc#1068569).
- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).
- xhci: Do not add a virt_dev to the devs array before it's fully
allocated (bnc#1012382).
- xhci: Fix ring leak in failure path of xhci_alloc_virt_device()
(bnc#1012382).
- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).
- zram: set physical queue limits to avoid array out of bounds accesses
(bnc#1012382).
- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP3:
zypper in -t patch SUSE-SLE-WE-12-SP3-2018-271=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-271=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-271=1
- SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-271=1
- SUSE Linux Enterprise High Availability 12-SP3:
zypper in -t patch SUSE-SLE-HA-12-SP3-2018-271=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-271=1
- SUSE CaaS Platform ALL:
zypper in -t patch SUSE-CAASP-ALL-2018-271=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):
kernel-default-debuginfo-4.4.114-94.11.3
kernel-default-debugsource-4.4.114-94.11.3
kernel-default-extra-4.4.114-94.11.3
kernel-default-extra-debuginfo-4.4.114-94.11.3
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
kernel-obs-build-4.4.114-94.11.3
kernel-obs-build-debugsource-4.4.114-94.11.3
- SUSE Linux Enterprise Software Development Kit 12-SP3 (noarch):
kernel-docs-4.4.114-94.11.4
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
kernel-default-4.4.114-94.11.3
kernel-default-base-4.4.114-94.11.3
kernel-default-base-debuginfo-4.4.114-94.11.3
kernel-default-debuginfo-4.4.114-94.11.3
kernel-default-debugsource-4.4.114-94.11.3
kernel-default-devel-4.4.114-94.11.3
kernel-syms-4.4.114-94.11.2
- SUSE Linux Enterprise Server 12-SP3 (noarch):
kernel-devel-4.4.114-94.11.2
kernel-macros-4.4.114-94.11.2
kernel-source-4.4.114-94.11.2
- SUSE Linux Enterprise Server 12-SP3 (s390x):
kernel-default-man-4.4.114-94.11.3
- SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):
kgraft-patch-4_4_114-94_11-default-1-4.3.5
kgraft-patch-4_4_114-94_11-default-debuginfo-1-4.3.5
- SUSE Linux Enterprise High Availability 12-SP3 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.4.114-94.11.3
cluster-md-kmp-default-debuginfo-4.4.114-94.11.3
dlm-kmp-default-4.4.114-94.11.3
dlm-kmp-default-debuginfo-4.4.114-94.11.3
gfs2-kmp-default-4.4.114-94.11.3
gfs2-kmp-default-debuginfo-4.4.114-94.11.3
kernel-default-debuginfo-4.4.114-94.11.3
kernel-default-debugsource-4.4.114-94.11.3
ocfs2-kmp-default-4.4.114-94.11.3
ocfs2-kmp-default-debuginfo-4.4.114-94.11.3
- SUSE Linux Enterprise Desktop 12-SP3 (noarch):
kernel-devel-4.4.114-94.11.2
kernel-macros-4.4.114-94.11.2
kernel-source-4.4.114-94.11.2
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
kernel-default-4.4.114-94.11.3
kernel-default-debuginfo-4.4.114-94.11.3
kernel-default-debugsource-4.4.114-94.11.3
kernel-default-devel-4.4.114-94.11.3
kernel-default-extra-4.4.114-94.11.3
kernel-default-extra-debuginfo-4.4.114-94.11.3
kernel-syms-4.4.114-94.11.2
- SUSE CaaS Platform ALL (x86_64):
kernel-default-4.4.114-94.11.3
kernel-default-debuginfo-4.4.114-94.11.3
kernel-default-debugsource-4.4.114-94.11.3
References:
https://www.suse.com/security/cve/CVE-2017-15129.html
https://www.suse.com/security/cve/CVE-2017-17712.html
https://www.suse.com/security/cve/CVE-2017-17862.html
https://www.suse.com/security/cve/CVE-2017-17864.html
https://www.suse.com/security/cve/CVE-2017-18017.html
https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-5332.html
https://www.suse.com/security/cve/CVE-2018-5333.html
https://bugzilla.suse.com/1005778
https://bugzilla.suse.com/1005780
https://bugzilla.suse.com/1005781
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1012917
https://bugzilla.suse.com/1015342
https://bugzilla.suse.com/1015343
https://bugzilla.suse.com/1019784
https://bugzilla.suse.com/1022476
https://bugzilla.suse.com/1022595
https://bugzilla.suse.com/1022912
https://bugzilla.suse.com/1024296
https://bugzilla.suse.com/1024376
https://bugzilla.suse.com/1031395
https://bugzilla.suse.com/1031492
https://bugzilla.suse.com/1031717
https://bugzilla.suse.com/1037838
https://bugzilla.suse.com/1038078
https://bugzilla.suse.com/1038085
https://bugzilla.suse.com/1040182
https://bugzilla.suse.com/1043652
https://bugzilla.suse.com/1048325
https://bugzilla.suse.com/1048585
https://bugzilla.suse.com/1053472
https://bugzilla.suse.com/1060279
https://bugzilla.suse.com/1062129
https://bugzilla.suse.com/1066163
https://bugzilla.suse.com/1066223
https://bugzilla.suse.com/1068032
https://bugzilla.suse.com/1068038
https://bugzilla.suse.com/1068569
https://bugzilla.suse.com/1068984
https://bugzilla.suse.com/1069138
https://bugzilla.suse.com/1069160
https://bugzilla.suse.com/1070052
https://bugzilla.suse.com/1070799
https://bugzilla.suse.com/1072163
https://bugzilla.suse.com/1072484
https://bugzilla.suse.com/1073229
https://bugzilla.suse.com/1073928
https://bugzilla.suse.com/1074134
https://bugzilla.suse.com/1074488
https://bugzilla.suse.com/1074621
https://bugzilla.suse.com/1074709
https://bugzilla.suse.com/1074839
https://bugzilla.suse.com/1074847
https://bugzilla.suse.com/1075066
https://bugzilla.suse.com/1075078
https://bugzilla.suse.com/1075087
https://bugzilla.suse.com/1075091
https://bugzilla.suse.com/1075397
https://bugzilla.suse.com/1075428
https://bugzilla.suse.com/1075617
https://bugzilla.suse.com/1075621
https://bugzilla.suse.com/1075627
https://bugzilla.suse.com/1075811
https://bugzilla.suse.com/1075994
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1076110
https://bugzilla.suse.com/1076187
https://bugzilla.suse.com/1076232
https://bugzilla.suse.com/1076805
https://bugzilla.suse.com/1076847
https://bugzilla.suse.com/1076872
https://bugzilla.suse.com/1076899
https://bugzilla.suse.com/1077068
https://bugzilla.suse.com/1077560
https://bugzilla.suse.com/1077592
https://bugzilla.suse.com/1077704
https://bugzilla.suse.com/1077871
https://bugzilla.suse.com/1078002
https://bugzilla.suse.com/1078681
https://bugzilla.suse.com/963844
https://bugzilla.suse.com/966170
https://bugzilla.suse.com/966172
https://bugzilla.suse.com/973818
https://bugzilla.suse.com/985025
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0374-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 06 Feb '18
by opensuse-security@opensuse.org 06 Feb '18
06 Feb '18
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0374-1
Rating: important
References: #1077291
Cross-References: CVE-2018-5089 CVE-2018-5091 CVE-2018-5095
CVE-2018-5096 CVE-2018-5097 CVE-2018-5098
CVE-2018-5099 CVE-2018-5102 CVE-2018-5103
CVE-2018-5104 CVE-2018-5117
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes 11 vulnerabilities is now available.
Description:
This update for MozillaFirefox to version 52.6 several issues.
These security issues were fixed:
- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder
allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during
XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements
(bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation
(bsc#1077291).
- CVE-2018-5089: Fixed several memory safety bugs (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned
left-to-right (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2018-263=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-263=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-263=1
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-263=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-263=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-263=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-263=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-263=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2018-263=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-263=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-263=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 6 (x86_64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-devel-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-devel-52.6.0esr-109.13.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-devel-52.6.0esr-109.13.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-devel-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-devel-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-devel-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
MozillaFirefox-52.6.0esr-109.13.1
MozillaFirefox-debuginfo-52.6.0esr-109.13.1
MozillaFirefox-debugsource-52.6.0esr-109.13.1
MozillaFirefox-translations-52.6.0esr-109.13.1
References:
https://www.suse.com/security/cve/CVE-2018-5089.html
https://www.suse.com/security/cve/CVE-2018-5091.html
https://www.suse.com/security/cve/CVE-2018-5095.html
https://www.suse.com/security/cve/CVE-2018-5096.html
https://www.suse.com/security/cve/CVE-2018-5097.html
https://www.suse.com/security/cve/CVE-2018-5098.html
https://www.suse.com/security/cve/CVE-2018-5099.html
https://www.suse.com/security/cve/CVE-2018-5102.html
https://www.suse.com/security/cve/CVE-2018-5103.html
https://www.suse.com/security/cve/CVE-2018-5104.html
https://www.suse.com/security/cve/CVE-2018-5117.html
https://bugzilla.suse.com/1077291
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0362-1: important: Security update for bind
by opensuse-security@opensuse.org 05 Feb '18
by opensuse-security@opensuse.org 05 Feb '18
05 Feb '18
SUSE Security Update: Security update for bind
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0362-1
Rating: important
References: #1040039 #1047184 #1076118
Cross-References: CVE-2017-3145
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for bind fixes several issues.
This security issue was fixed:
- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
use-after-free error that triggered an assertion failure and crash in
named (bsc#1076118).
These non-security issues were fixed:
- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-bind-13455=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-bind-13455=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-bind-13455=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-bind-13455=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-bind-13455=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-bind-13455=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
bind-devel-9.9.6P1-0.51.7.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64):
bind-devel-32bit-9.9.6P1-0.51.7.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
bind-9.9.6P1-0.51.7.1
bind-chrootenv-9.9.6P1-0.51.7.1
bind-doc-9.9.6P1-0.51.7.1
bind-libs-9.9.6P1-0.51.7.1
bind-utils-9.9.6P1-0.51.7.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
bind-libs-32bit-9.9.6P1-0.51.7.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
bind-9.9.6P1-0.51.7.1
bind-chrootenv-9.9.6P1-0.51.7.1
bind-devel-9.9.6P1-0.51.7.1
bind-doc-9.9.6P1-0.51.7.1
bind-libs-9.9.6P1-0.51.7.1
bind-utils-9.9.6P1-0.51.7.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64):
bind-libs-32bit-9.9.6P1-0.51.7.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
bind-9.9.6P1-0.51.7.1
bind-chrootenv-9.9.6P1-0.51.7.1
bind-devel-9.9.6P1-0.51.7.1
bind-doc-9.9.6P1-0.51.7.1
bind-libs-9.9.6P1-0.51.7.1
bind-utils-9.9.6P1-0.51.7.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
bind-debuginfo-9.9.6P1-0.51.7.1
bind-debugsource-9.9.6P1-0.51.7.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
bind-debuginfo-9.9.6P1-0.51.7.1
bind-debugsource-9.9.6P1-0.51.7.1
References:
https://www.suse.com/security/cve/CVE-2017-3145.html
https://bugzilla.suse.com/1040039
https://bugzilla.suse.com/1047184
https://bugzilla.suse.com/1076118
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0361-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 05 Feb '18
by opensuse-security@opensuse.org 05 Feb '18
05 Feb '18
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0361-1
Rating: important
References: #1077291
Cross-References: CVE-2018-5089 CVE-2018-5091 CVE-2018-5095
CVE-2018-5096 CVE-2018-5097 CVE-2018-5098
CVE-2018-5099 CVE-2018-5102 CVE-2018-5103
CVE-2018-5104 CVE-2018-5117
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes 11 vulnerabilities is now available.
Description:
This update for MozillaFirefox to version ESR 52.6 fixes several issues.
These security issues were fixed:
- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder
allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during
XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements
(bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation
(bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned
left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-MozillaFirefox-13456=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-MozillaFirefox-13456=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-MozillaFirefox-13456=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-MozillaFirefox-13456=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-MozillaFirefox-13456=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-MozillaFirefox-13456=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-devel-52.6.0esr-72.20.2
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-52.6.0esr-72.20.2
MozillaFirefox-translations-52.6.0esr-72.20.2
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
MozillaFirefox-52.6.0esr-72.20.2
MozillaFirefox-translations-52.6.0esr-72.20.2
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
MozillaFirefox-52.6.0esr-72.20.2
MozillaFirefox-translations-52.6.0esr-72.20.2
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-debuginfo-52.6.0esr-72.20.2
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
MozillaFirefox-debuginfo-52.6.0esr-72.20.2
References:
https://www.suse.com/security/cve/CVE-2018-5089.html
https://www.suse.com/security/cve/CVE-2018-5091.html
https://www.suse.com/security/cve/CVE-2018-5095.html
https://www.suse.com/security/cve/CVE-2018-5096.html
https://www.suse.com/security/cve/CVE-2018-5097.html
https://www.suse.com/security/cve/CVE-2018-5098.html
https://www.suse.com/security/cve/CVE-2018-5099.html
https://www.suse.com/security/cve/CVE-2018-5102.html
https://www.suse.com/security/cve/CVE-2018-5103.html
https://www.suse.com/security/cve/CVE-2018-5104.html
https://www.suse.com/security/cve/CVE-2018-5117.html
https://bugzilla.suse.com/1077291
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0347-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)
by opensuse-security@opensuse.org 01 Feb '18
by opensuse-security@opensuse.org 01 Feb '18
01 Feb '18
SUSE Security Update: Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0347-1
Rating: important
References: #1069708 #1073230
Cross-References: CVE-2017-16939 CVE-2017-17712
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 4.4.82-6_9 fixes several issues.
The following security issues were fixed:
- CVE-2017-17712: The raw_sendmsg() function had a race condition that
lead to uninitialized stack pointer usage. This allowed a local user to
execute code and gain privileges (bsc#1073230).
- CVE-2017-16939: The XFRM dump policy implementation allowed local users
to gain privileges or cause a denial of service (use-after-free) via a
crafted SO_RCVBUF setsockopt system call in conjunction with
XFRM_MSG_GETPOLICY Netlink messages (bsc#1069708).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-240=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):
kgraft-patch-4_4_82-6_9-default-4-2.1
kgraft-patch-4_4_82-6_9-default-debuginfo-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-16939.html
https://www.suse.com/security/cve/CVE-2017-17712.html
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1073230
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0346-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)
by opensuse-security@opensuse.org 01 Feb '18
by opensuse-security@opensuse.org 01 Feb '18
01 Feb '18
SUSE Security Update: Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0346-1
Rating: important
References: #1069708 #1073230
Cross-References: CVE-2017-16939 CVE-2017-17712
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 4.4.82-6_3 fixes several issues.
The following security issues were fixed:
- CVE-2017-17712: The raw_sendmsg() function had a race condition that
lead to uninitialized stack pointer usage. This allowed a local user to
execute code and gain privileges (bsc#1073230).
- CVE-2017-16939: The XFRM dump policy implementation allowed local users
to gain privileges or cause a denial of service (use-after-free) via a
crafted SO_RCVBUF setsockopt system call in conjunction with
XFRM_MSG_GETPOLICY Netlink messages (bsc#1069708).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-239=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):
kgraft-patch-4_4_82-6_3-default-5-2.1
kgraft-patch-4_4_82-6_3-default-debuginfo-5-2.1
References:
https://www.suse.com/security/cve/CVE-2017-16939.html
https://www.suse.com/security/cve/CVE-2017-17712.html
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1073230
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0345-1: important: Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)
by opensuse-security@opensuse.org 01 Feb '18
by opensuse-security@opensuse.org 01 Feb '18
01 Feb '18
SUSE Security Update: Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0345-1
Rating: important
References: #1069708 #1073230
Cross-References: CVE-2017-16939 CVE-2017-17712
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 4.4.90-6_12 fixes several issues.
The following security issues were fixed:
- CVE-2017-17712: The raw_sendmsg() function had a race condition that
lead to uninitialized stack pointer usage. This allowed a local user to
execute code and gain privileges (bsc#1073230).
- CVE-2017-16939: The XFRM dump policy implementation allowed local users
to gain privileges or cause a denial of service (use-after-free) via a
crafted SO_RCVBUF setsockopt system call in conjunction with
XFRM_MSG_GETPOLICY Netlink messages (bsc#1069708).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-242=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):
kgraft-patch-4_4_92-6_18-default-3-2.1
kgraft-patch-4_4_92-6_18-default-debuginfo-3-2.1
References:
https://www.suse.com/security/cve/CVE-2017-16939.html
https://www.suse.com/security/cve/CVE-2017-17712.html
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1073230
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2018:0340-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)
by opensuse-security@opensuse.org 01 Feb '18
by opensuse-security@opensuse.org 01 Feb '18
01 Feb '18
SUSE Security Update: Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0340-1
Rating: important
References: #1069708 #1073230
Cross-References: CVE-2017-16939 CVE-2017-17712
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 4.4.82-6_6 fixes several issues.
The following security issues were fixed:
- CVE-2017-17712: The raw_sendmsg() function had a race condition that
lead to uninitialized stack pointer usage. This allowed a local user to
execute code and gain privileges (bsc#1073230).
- CVE-2017-16939: The XFRM dump policy implementation allowed local users
to gain privileges or cause a denial of service (use-after-free) via a
crafted SO_RCVBUF setsockopt system call in conjunction with
XFRM_MSG_GETPOLICY Netlink messages (bsc#1069708).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-241=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):
kgraft-patch-4_4_82-6_6-default-4-2.1
kgraft-patch-4_4_82-6_6-default-debuginfo-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-16939.html
https://www.suse.com/security/cve/CVE-2017-17712.html
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1073230
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2018:0329-1: important: Security update for freeimage
by opensuse-security@opensuse.org 01 Feb '18
by opensuse-security@opensuse.org 01 Feb '18
01 Feb '18
openSUSE Security Update: Security update for freeimage
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0329-1
Rating: important
References: #1002621
Cross-References: CVE-2016-5684
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for freeimage fixes one issues.
This security issue was fixed:
- CVE-2016-5684: Prevent out-of-bounds write vulnerability in the XMP
image handling functionality. A specially crafted XMP file could have
caused an arbitrary memory overwrite resulting in code execution
(boo#1002621).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-121=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (x86_64):
freeimage-debugsource-3.17.0-5.1
freeimage-devel-3.17.0-5.1
libfreeimage3-3.17.0-5.1
libfreeimage3-debuginfo-3.17.0-5.1
libfreeimageplus3-3.17.0-5.1
libfreeimageplus3-debuginfo-3.17.0-5.1
References:
https://www.suse.com/security/cve/CVE-2016-5684.html
https://bugzilla.suse.com/1002621
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0