openSUSE Security Announce
Threads by month
- ----- 2024 -----
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
June 2019
- 2 participants
- 93 discussions
[security-announce] openSUSE-SU-2019:1590-1: moderate: Security update for elfutils
by opensuse-security@opensuse.org 20 Jun '19
by opensuse-security@opensuse.org 20 Jun '19
20 Jun '19
openSUSE Security Update: Security update for elfutils
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1590-1
Rating: moderate
References: #1033084 #1033085 #1033086 #1033087 #1033088
#1033089 #1033090 #1106390 #1107066 #1107067
#1111973 #1112723 #1112726 #1123685 #1125007
Cross-References: CVE-2017-7607 CVE-2017-7608 CVE-2017-7609
CVE-2017-7610 CVE-2017-7611 CVE-2017-7612
CVE-2017-7613 CVE-2018-16062 CVE-2018-16402
CVE-2018-16403 CVE-2018-18310 CVE-2018-18520
CVE-2018-18521 CVE-2019-7150 CVE-2019-7665
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes 15 vulnerabilities is now available.
Description:
This update for elfutils fixes the following issues:
Security issues fixed:
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash
(bsc#1033084)
- CVE-2017-7608: Fixed a heap-based buffer overflow in
ebl_object_note_type_name() (bsc#1033085)
- CVE-2017-7609: Fixed a memory allocation failure in __libelf_decompress
(bsc#1033086)
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group
(bsc#1033087)
- CVE-2017-7611: Fixed a denial of service via a crafted ELF file
(bsc#1033088)
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a
crafted ELF file (bsc#1033089)
- CVE-2017-7613: Fixed denial of service caused by the missing validation
of the number of sections and the number of segments in a crafted ELF
file (bsc#1033090)
- CVE-2018-16062: Fixed a heap-buffer overflow in
/elfutils/libdw/dwarf_getaranges.c:156 (bsc#1106390)
- CVE-2018-16402: Fixed a denial of service/double free on an attempt to
decompress the same section twice (bsc#1107066)
- CVE-2018-16403: Fixed a heap buffer overflow in readelf (bsc#1107067)
- CVE-2018-18310: Fixed an invalid address read problem in
dwfl_segment_report_module.c (bsc#1111973)
- CVE-2018-18520: Fixed bad handling of ar files inside are files
(bsc#1112726)
- CVE-2018-18521: Fixed a denial of service vulnerabilities in the
function arlib_add_symbols() used by eu-ranlib (bsc#1112723)
- CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn
data read from core file is truncated (bsc#1123685)
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated
string (bsc#1125007)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-1590=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1590=1
Package List:
- openSUSE Leap 15.1 (i586 x86_64):
elfutils-0.168-lp151.4.3.1
elfutils-debuginfo-0.168-lp151.4.3.1
elfutils-debugsource-0.168-lp151.4.3.1
libasm-devel-0.168-lp151.4.3.1
libasm1-0.168-lp151.4.3.1
libasm1-debuginfo-0.168-lp151.4.3.1
libdw-devel-0.168-lp151.4.3.1
libdw1-0.168-lp151.4.3.1
libdw1-debuginfo-0.168-lp151.4.3.1
libebl-devel-0.168-lp151.4.3.1
libebl-plugins-0.168-lp151.4.3.1
libebl-plugins-debuginfo-0.168-lp151.4.3.1
libelf-devel-0.168-lp151.4.3.1
libelf1-0.168-lp151.4.3.1
libelf1-debuginfo-0.168-lp151.4.3.1
- openSUSE Leap 15.1 (noarch):
elfutils-lang-0.168-lp151.4.3.1
- openSUSE Leap 15.1 (x86_64):
libasm1-32bit-0.168-lp151.4.3.1
libasm1-32bit-debuginfo-0.168-lp151.4.3.1
libdw1-32bit-0.168-lp151.4.3.1
libdw1-32bit-debuginfo-0.168-lp151.4.3.1
libebl-plugins-32bit-0.168-lp151.4.3.1
libebl-plugins-32bit-debuginfo-0.168-lp151.4.3.1
libelf-devel-32bit-0.168-lp151.4.3.1
libelf1-32bit-0.168-lp151.4.3.1
libelf1-32bit-debuginfo-0.168-lp151.4.3.1
- openSUSE Leap 15.0 (i586 x86_64):
elfutils-0.168-lp150.3.3.1
elfutils-debuginfo-0.168-lp150.3.3.1
elfutils-debugsource-0.168-lp150.3.3.1
libasm-devel-0.168-lp150.3.3.1
libasm1-0.168-lp150.3.3.1
libasm1-debuginfo-0.168-lp150.3.3.1
libdw-devel-0.168-lp150.3.3.1
libdw1-0.168-lp150.3.3.1
libdw1-debuginfo-0.168-lp150.3.3.1
libebl-devel-0.168-lp150.3.3.1
libebl-plugins-0.168-lp150.3.3.1
libebl-plugins-debuginfo-0.168-lp150.3.3.1
libelf-devel-0.168-lp150.3.3.1
libelf1-0.168-lp150.3.3.1
libelf1-debuginfo-0.168-lp150.3.3.1
- openSUSE Leap 15.0 (noarch):
elfutils-lang-0.168-lp150.3.3.1
- openSUSE Leap 15.0 (x86_64):
libasm1-32bit-0.168-lp150.3.3.1
libasm1-32bit-debuginfo-0.168-lp150.3.3.1
libdw1-32bit-0.168-lp150.3.3.1
libdw1-32bit-debuginfo-0.168-lp150.3.3.1
libebl-plugins-32bit-0.168-lp150.3.3.1
libebl-plugins-32bit-debuginfo-0.168-lp150.3.3.1
libelf-devel-32bit-0.168-lp150.3.3.1
libelf1-32bit-0.168-lp150.3.3.1
libelf1-32bit-debuginfo-0.168-lp150.3.3.1
References:
https://www.suse.com/security/cve/CVE-2017-7607.html
https://www.suse.com/security/cve/CVE-2017-7608.html
https://www.suse.com/security/cve/CVE-2017-7609.html
https://www.suse.com/security/cve/CVE-2017-7610.html
https://www.suse.com/security/cve/CVE-2017-7611.html
https://www.suse.com/security/cve/CVE-2017-7612.html
https://www.suse.com/security/cve/CVE-2017-7613.html
https://www.suse.com/security/cve/CVE-2018-16062.html
https://www.suse.com/security/cve/CVE-2018-16402.html
https://www.suse.com/security/cve/CVE-2018-16403.html
https://www.suse.com/security/cve/CVE-2018-18310.html
https://www.suse.com/security/cve/CVE-2018-18520.html
https://www.suse.com/security/cve/CVE-2018-18521.html
https://www.suse.com/security/cve/CVE-2019-7150.html
https://www.suse.com/security/cve/CVE-2019-7665.html
https://bugzilla.suse.com/1033084
https://bugzilla.suse.com/1033085
https://bugzilla.suse.com/1033086
https://bugzilla.suse.com/1033087
https://bugzilla.suse.com/1033088
https://bugzilla.suse.com/1033089
https://bugzilla.suse.com/1033090
https://bugzilla.suse.com/1106390
https://bugzilla.suse.com/1107066
https://bugzilla.suse.com/1107067
https://bugzilla.suse.com/1111973
https://bugzilla.suse.com/1112723
https://bugzilla.suse.com/1112726
https://bugzilla.suse.com/1123685
https://bugzilla.suse.com/1125007
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1589-1: moderate: Security update for sssd
by opensuse-security@opensuse.org 19 Jun '19
by opensuse-security@opensuse.org 19 Jun '19
19 Jun '19
openSUSE Security Update: Security update for sssd
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1589-1
Rating: moderate
References: #1124194 #1132657 #1132879 #1135247
Cross-References: CVE-2018-16838
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
This update for sssd fixes the following issues:
Security issue fixed:
- CVE-2018-16838: Fixed an authentication bypass related to the Group
Policy Objects implementation (bsc#1124194).
Non-security issues fixed:
- Allow defaults sudoRole without sudoUser attribute (bsc#1135247)
- Missing GPOs directory could have led to login problems (bsc#1132879)
- Fix a crash by adding a netgroup counter to struct nss_enum_index
(bsc#1132657)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-1589=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1589=1
Package List:
- openSUSE Leap 15.1 (i586 x86_64):
libipa_hbac-devel-1.16.1-lp151.7.3.1
libipa_hbac0-1.16.1-lp151.7.3.1
libipa_hbac0-debuginfo-1.16.1-lp151.7.3.1
libnfsidmap-sss-1.16.1-lp151.7.3.1
libnfsidmap-sss-debuginfo-1.16.1-lp151.7.3.1
libsss_certmap-devel-1.16.1-lp151.7.3.1
libsss_certmap0-1.16.1-lp151.7.3.1
libsss_certmap0-debuginfo-1.16.1-lp151.7.3.1
libsss_idmap-devel-1.16.1-lp151.7.3.1
libsss_idmap0-1.16.1-lp151.7.3.1
libsss_idmap0-debuginfo-1.16.1-lp151.7.3.1
libsss_nss_idmap-devel-1.16.1-lp151.7.3.1
libsss_nss_idmap0-1.16.1-lp151.7.3.1
libsss_nss_idmap0-debuginfo-1.16.1-lp151.7.3.1
libsss_simpleifp-devel-1.16.1-lp151.7.3.1
libsss_simpleifp0-1.16.1-lp151.7.3.1
libsss_simpleifp0-debuginfo-1.16.1-lp151.7.3.1
python3-ipa_hbac-1.16.1-lp151.7.3.1
python3-ipa_hbac-debuginfo-1.16.1-lp151.7.3.1
python3-sss-murmur-1.16.1-lp151.7.3.1
python3-sss-murmur-debuginfo-1.16.1-lp151.7.3.1
python3-sss_nss_idmap-1.16.1-lp151.7.3.1
python3-sss_nss_idmap-debuginfo-1.16.1-lp151.7.3.1
python3-sssd-config-1.16.1-lp151.7.3.1
python3-sssd-config-debuginfo-1.16.1-lp151.7.3.1
sssd-1.16.1-lp151.7.3.1
sssd-ad-1.16.1-lp151.7.3.1
sssd-ad-debuginfo-1.16.1-lp151.7.3.1
sssd-dbus-1.16.1-lp151.7.3.1
sssd-dbus-debuginfo-1.16.1-lp151.7.3.1
sssd-debuginfo-1.16.1-lp151.7.3.1
sssd-debugsource-1.16.1-lp151.7.3.1
sssd-ipa-1.16.1-lp151.7.3.1
sssd-ipa-debuginfo-1.16.1-lp151.7.3.1
sssd-krb5-1.16.1-lp151.7.3.1
sssd-krb5-common-1.16.1-lp151.7.3.1
sssd-krb5-common-debuginfo-1.16.1-lp151.7.3.1
sssd-krb5-debuginfo-1.16.1-lp151.7.3.1
sssd-ldap-1.16.1-lp151.7.3.1
sssd-ldap-debuginfo-1.16.1-lp151.7.3.1
sssd-proxy-1.16.1-lp151.7.3.1
sssd-proxy-debuginfo-1.16.1-lp151.7.3.1
sssd-tools-1.16.1-lp151.7.3.1
sssd-tools-debuginfo-1.16.1-lp151.7.3.1
sssd-wbclient-1.16.1-lp151.7.3.1
sssd-wbclient-debuginfo-1.16.1-lp151.7.3.1
sssd-wbclient-devel-1.16.1-lp151.7.3.1
sssd-winbind-idmap-1.16.1-lp151.7.3.1
sssd-winbind-idmap-debuginfo-1.16.1-lp151.7.3.1
- openSUSE Leap 15.1 (x86_64):
sssd-32bit-1.16.1-lp151.7.3.1
sssd-32bit-debuginfo-1.16.1-lp151.7.3.1
- openSUSE Leap 15.0 (i586 x86_64):
libipa_hbac-devel-1.16.1-lp150.2.16.1
libipa_hbac0-1.16.1-lp150.2.16.1
libipa_hbac0-debuginfo-1.16.1-lp150.2.16.1
libnfsidmap-sss-1.16.1-lp150.2.16.1
libnfsidmap-sss-debuginfo-1.16.1-lp150.2.16.1
libsss_certmap-devel-1.16.1-lp150.2.16.1
libsss_certmap0-1.16.1-lp150.2.16.1
libsss_certmap0-debuginfo-1.16.1-lp150.2.16.1
libsss_idmap-devel-1.16.1-lp150.2.16.1
libsss_idmap0-1.16.1-lp150.2.16.1
libsss_idmap0-debuginfo-1.16.1-lp150.2.16.1
libsss_nss_idmap-devel-1.16.1-lp150.2.16.1
libsss_nss_idmap0-1.16.1-lp150.2.16.1
libsss_nss_idmap0-debuginfo-1.16.1-lp150.2.16.1
libsss_simpleifp-devel-1.16.1-lp150.2.16.1
libsss_simpleifp0-1.16.1-lp150.2.16.1
libsss_simpleifp0-debuginfo-1.16.1-lp150.2.16.1
python3-ipa_hbac-1.16.1-lp150.2.16.1
python3-ipa_hbac-debuginfo-1.16.1-lp150.2.16.1
python3-sss-murmur-1.16.1-lp150.2.16.1
python3-sss-murmur-debuginfo-1.16.1-lp150.2.16.1
python3-sss_nss_idmap-1.16.1-lp150.2.16.1
python3-sss_nss_idmap-debuginfo-1.16.1-lp150.2.16.1
python3-sssd-config-1.16.1-lp150.2.16.1
python3-sssd-config-debuginfo-1.16.1-lp150.2.16.1
sssd-1.16.1-lp150.2.16.1
sssd-ad-1.16.1-lp150.2.16.1
sssd-ad-debuginfo-1.16.1-lp150.2.16.1
sssd-dbus-1.16.1-lp150.2.16.1
sssd-dbus-debuginfo-1.16.1-lp150.2.16.1
sssd-debuginfo-1.16.1-lp150.2.16.1
sssd-debugsource-1.16.1-lp150.2.16.1
sssd-ipa-1.16.1-lp150.2.16.1
sssd-ipa-debuginfo-1.16.1-lp150.2.16.1
sssd-krb5-1.16.1-lp150.2.16.1
sssd-krb5-common-1.16.1-lp150.2.16.1
sssd-krb5-common-debuginfo-1.16.1-lp150.2.16.1
sssd-krb5-debuginfo-1.16.1-lp150.2.16.1
sssd-ldap-1.16.1-lp150.2.16.1
sssd-ldap-debuginfo-1.16.1-lp150.2.16.1
sssd-proxy-1.16.1-lp150.2.16.1
sssd-proxy-debuginfo-1.16.1-lp150.2.16.1
sssd-tools-1.16.1-lp150.2.16.1
sssd-tools-debuginfo-1.16.1-lp150.2.16.1
sssd-wbclient-1.16.1-lp150.2.16.1
sssd-wbclient-debuginfo-1.16.1-lp150.2.16.1
sssd-wbclient-devel-1.16.1-lp150.2.16.1
sssd-winbind-idmap-1.16.1-lp150.2.16.1
sssd-winbind-idmap-debuginfo-1.16.1-lp150.2.16.1
- openSUSE Leap 15.0 (x86_64):
sssd-32bit-1.16.1-lp150.2.16.1
sssd-32bit-debuginfo-1.16.1-lp150.2.16.1
References:
https://www.suse.com/security/cve/CVE-2018-16838.html
https://bugzilla.suse.com/1124194
https://bugzilla.suse.com/1132657
https://bugzilla.suse.com/1132879
https://bugzilla.suse.com/1135247
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1580-1: important: Security update for python
by opensuse-security@opensuse.org 18 Jun '19
by opensuse-security@opensuse.org 18 Jun '19
18 Jun '19
openSUSE Security Update: Security update for python
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1580-1
Rating: important
References: #1129346 #1130847
Cross-References: CVE-2019-9636 CVE-2019-9948
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for python fixes the following issues:
Security issues fixed:
- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the
'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect
handling of Unicode encoding during NFKC normalization (bsc#1129346).
This update was imported from the SUSE:SLE-12-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1580=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
libpython2_7-1_0-2.7.13-27.15.1
libpython2_7-1_0-debuginfo-2.7.13-27.15.1
python-2.7.13-27.15.1
python-base-2.7.13-27.15.1
python-base-debuginfo-2.7.13-27.15.1
python-base-debugsource-2.7.13-27.15.1
python-curses-2.7.13-27.15.1
python-curses-debuginfo-2.7.13-27.15.1
python-debuginfo-2.7.13-27.15.1
python-debugsource-2.7.13-27.15.1
python-demo-2.7.13-27.15.1
python-devel-2.7.13-27.15.1
python-gdbm-2.7.13-27.15.1
python-gdbm-debuginfo-2.7.13-27.15.1
python-idle-2.7.13-27.15.1
python-tk-2.7.13-27.15.1
python-tk-debuginfo-2.7.13-27.15.1
python-xml-2.7.13-27.15.1
python-xml-debuginfo-2.7.13-27.15.1
- openSUSE Leap 42.3 (x86_64):
libpython2_7-1_0-32bit-2.7.13-27.15.1
libpython2_7-1_0-debuginfo-32bit-2.7.13-27.15.1
python-32bit-2.7.13-27.15.1
python-base-32bit-2.7.13-27.15.1
python-base-debuginfo-32bit-2.7.13-27.15.1
python-debuginfo-32bit-2.7.13-27.15.1
- openSUSE Leap 42.3 (noarch):
python-doc-2.7.13-27.15.1
python-doc-pdf-2.7.13-27.15.1
References:
https://www.suse.com/security/cve/CVE-2019-9636.html
https://www.suse.com/security/cve/CVE-2019-9948.html
https://bugzilla.suse.com/1129346
https://bugzilla.suse.com/1130847
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1582-1: moderate: Security update for gnome-shell
by opensuse-security@opensuse.org 18 Jun '19
by opensuse-security@opensuse.org 18 Jun '19
18 Jun '19
openSUSE Security Update: Security update for gnome-shell
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1582-1
Rating: moderate
References: #1124493
Cross-References: CVE-2019-3820
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for gnome-shell fixes the following issues:
Security issue fixed:
- CVE-2019-3820: Fixed a partial lock screen bypass (bsc#1124493).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-1582=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1582=1
Package List:
- openSUSE Leap 15.1 (noarch):
gnome-shell-lang-3.26.2+20180130.0d9c74212-lp151.7.3.1
- openSUSE Leap 15.1 (x86_64):
gnome-shell-3.26.2+20180130.0d9c74212-lp151.7.3.1
gnome-shell-browser-plugin-3.26.2+20180130.0d9c74212-lp151.7.3.1
gnome-shell-browser-plugin-debuginfo-3.26.2+20180130.0d9c74212-lp151.7.3.1
gnome-shell-calendar-3.26.2+20180130.0d9c74212-lp151.7.3.1
gnome-shell-calendar-debuginfo-3.26.2+20180130.0d9c74212-lp151.7.3.1
gnome-shell-debuginfo-3.26.2+20180130.0d9c74212-lp151.7.3.1
gnome-shell-debugsource-3.26.2+20180130.0d9c74212-lp151.7.3.1
gnome-shell-devel-3.26.2+20180130.0d9c74212-lp151.7.3.1
- openSUSE Leap 15.0 (noarch):
gnome-shell-lang-3.26.2+20180130.0d9c74212-lp150.3.16.1
- openSUSE Leap 15.0 (x86_64):
gnome-shell-3.26.2+20180130.0d9c74212-lp150.3.16.1
gnome-shell-browser-plugin-3.26.2+20180130.0d9c74212-lp150.3.16.1
gnome-shell-browser-plugin-debuginfo-3.26.2+20180130.0d9c74212-lp150.3.16.1
gnome-shell-calendar-3.26.2+20180130.0d9c74212-lp150.3.16.1
gnome-shell-calendar-debuginfo-3.26.2+20180130.0d9c74212-lp150.3.16.1
gnome-shell-debuginfo-3.26.2+20180130.0d9c74212-lp150.3.16.1
gnome-shell-debugsource-3.26.2+20180130.0d9c74212-lp150.3.16.1
gnome-shell-devel-3.26.2+20180130.0d9c74212-lp150.3.16.1
References:
https://www.suse.com/security/cve/CVE-2019-3820.html
https://bugzilla.suse.com/1124493
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1579-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 18 Jun '19
by opensuse-security@opensuse.org 18 Jun '19
18 Jun '19
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1579-1
Rating: important
References: #1012382 #1050242 #1051510 #1053043 #1056787
#1058115 #1061840 #1063638 #1064802 #1065600
#1065729 #1066129 #1068546 #1071995 #1075020
#1082387 #1083647 #1085535 #1099658 #1103992
#1104353 #1104427 #1106284 #1108838 #1111696
#1113722 #1114427 #1115688 #1117158 #1117561
#1118139 #1120091 #1120423 #1120566 #1120843
#1120902 #1123454 #1123663 #1124503 #1126356
#1127616 #1128052 #1128432 #1128904 #1129693
#1129770 #1130699 #1131565 #1131673 #1133190
#1133320 #1133612 #1133616 #1134597 #1134671
#1134806 #1134936 #1135056 #1135120 #1135278
#1135281 #1135309 #1135312 #1135314 #1135315
#1135316 #1135320 #1135323 #1135330 #1135492
#1135542 #1135556 #1135603 #1135642 #1135661
#1135758 #1136206 #1136424 #1136428 #1136430
#1136432 #1136434 #1136435 #1136438 #1136439
#1136477 #1136478 #1136573 #1136586 #1136598
#1136881 #1136922 #1136935 #1136990 #1137151
#1137152 #1137153 #1137162 #1137372 #1137429
#1137444 #1137586 #1137739 #1137752 #1137995
#1137996 #1137998 #1137999 #1138000 #1138002
#1138003 #1138005 #1138006 #1138007 #1138008
#1138009 #1138010 #1138011 #1138012 #1138013
#1138014 #1138015 #1138016 #1138017 #1138018
#1138019 #1138291 #1138293 #1138374 #1138375
Cross-References: CVE-2018-7191 CVE-2019-10124 CVE-2019-11085
CVE-2019-11477 CVE-2019-11478 CVE-2019-11479
CVE-2019-11487 CVE-2019-11833 CVE-2019-12380
CVE-2019-12382 CVE-2019-12456 CVE-2019-12818
CVE-2019-12819 CVE-2019-3846 CVE-2019-5489
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves 15 vulnerabilities and has 115 fixes
is now available.
Description:
The openSUSE Leap 15.0 kernel was updated to receive various security and
bugfixes.
The following security bugs were fixed:
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote
attacker such that one can trigger an integer overflow, leading to a
kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs
which would fragment the TCP retransmission queue. A remote attacker may
have been able to further exploit the fragmented queue to cause an
expensive linked-list walk for subsequent SACKs received for that same
TCP connection. (bsc#1137586)
- CVE-2019-11479: It was possible to send a crafted sequence of SACKs
which would fragment the RACK send map. A remote attacker may be able to
further exploit the fragmented send map to cause an expensive
linked-list walk for subsequent SACKs received for that same TCP
connection. This would have resulted in excess resource consumption due
to low mss values. (bsc#1137586)
- CVE-2019-12819: The function __mdiobus_register() in
drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a
fixed_mdio_bus_init use-after-free. This will cause a denial of service
(bnc#1138291).
- CVE-2019-12818: The nfc_llcp_build_tlv function in
net/nfc/llcp_commands.c may return NULL. If the caller did not check for
this, it will trigger a NULL pointer dereference. This will cause denial
of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c
(bnc#1138293).
- CVE-2019-12456: local users could cause a denial of service or possibly
have unspecified other impact by changing the value of ioc_number
between two kernel reads of that value, aka a "double fetch"
vulnerability. (bnc#1136922)
- CVE-2019-12380: phys_efi_set_virtual_address_map in
arch/x86/platform/efi/efi.c and efi_call_phys_prolog in
arch/x86/platform/efi/efi_64.c mishandle memory allocation failures
(bnc#1136598).
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and
possibly escalate privileges was found in the mwifiex kernel module
while connecting to a malicious wireless network (bnc#1136424).
- CVE-2019-10124: An attacker could exploit an issue in the hwpoison
implementation to cause a denial of service (BUG). (bsc#1130699)
- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in
drivers/gpu/drm/drm_edid_load.c. There was an unchecked kstrdup of
fwstr, which might allow an attacker to cause a denial of service (NULL
pointer dereference and system crash) (bnc#1136586).
- CVE-2019-11487: The Linux kernel before 5.1-rc5 allowed page->_refcount
reference count overflow, with resultant use-after-free issues, if about
140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c,
fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h,
kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE
requests (bnc#1133190).
- CVE-2019-5489: The mincore() implementation in mm/mincore.c allowed
local attackers to observe page cache access patterns of other processes
on the same system, potentially allowing sniffing of secret information.
(Fixing this affects the output of the fincore program.) Limited remote
exploitation may be possible, as demonstrated by latency differences in
accessing public files from an Apache HTTP Server (bnc#1120843).
- CVE-2019-11833: fs/ext4/extents.c did not zero out the unused memory
region in the extent tree block, which might allow local users to obtain
sensitive information by reading uninitialized data in the filesystem
(bnc#1135281).
- CVE-2018-7191: In the tun subsystem dev_get_valid_name is not called
before register_netdevice. This allowed local users to cause a denial of
service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF)
call with a dev name containing a / character. This is similar to
CVE-2013-4343 (bnc#1135603).
- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in
Intel(R) i915 Graphics may have allowed an authenticated user to
potentially enable escalation of privilege via local access
(bnc#1135278).
The following non-security bugs were fixed:
- 9p locks: add mount option for lock retry interval (bsc#1051510).
- ACPI: Add Hygon Dhyana support ().
- ACPI: button: reinitialize button state upon resume (bsc#1051510).
- ACPICA: AML interpreter: add region addresses in global list during
initialization (bsc#1051510).
- ACPICA: Namespace: remove address node from global list after method
termination (bsc#1051510).
- ACPI: fix menuconfig presentation of ACPI submenu (bsc#1117158).
- ACPI / property: fix handling of data_nodes in acpi_get_next_subnode()
(bsc#1051510).
- ACPI / utils: Drop reference in test for device presence (bsc#1051510).
- ALSA: firewire-motu: fix destruction of data for isochronous resources
(bsc#1051510).
- ALSA: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).
- ALSA: hda/realtek - Corrected fixup for System76 Gazelle (gaze14)
(bsc#1051510).
- ALSA: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone
bug (bsc#1051510).
- ALSA: hda/realtek - Fixup headphone noise via runtime suspend
(bsc#1051510).
- ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops
(bsc#1051510).
- ALSA: hda/realtek - Set default power save node to 0 (bsc#1051510).
- ALSA: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- ALSA: hda - Use a macro for snd_array iteration loops (bsc#1051510).
- ALSA: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- appletalk: Fix compile regression (bsc#1051510).
- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).
- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).
- arm64: acpi: fix alignment fault in accessing ACPI (bsc#1117158).
- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).
- arm64: fix ACPI dependencies (bsc#1117158).
- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve
table (bsc#1117158).
- arm64/x86: Update config files. Use CONFIG_ARCH_SUPPORTS_ACPI
- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).
- arm: 8833/1: Ensure that NEON code always compiles with Clang
(bsc#1051510).
- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).
- arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).
- arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).
- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time
(bsc#1051510).
- arm: iop: do not use using 64-bit DMA masks (bsc#1051510).
- arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug
(bsc#1051510).
- arm: OMAP2+: Variable "reg" in function omap4_dsi_mux_pads() could be
uninitialized (bsc#1051510).
- arm: orion: do not use using 64-bit DMA masks (bsc#1051510).
- arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).
- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).
- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos
platforms (bsc#1051510).
- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).
- ASoC: eukrea-tlv320: fix a leaked reference by adding missing
of_node_put (bsc#1051510).
- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).
- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put
(bsc#1051510).
- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).
- backlight: lm3630a: Return 0 on success in update_status functions
(bsc#1051510).
- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies
(bsc#1051510).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).
- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).
- block: fix the return errno for direct IO (bsc#1135320).
- block: fix use-after-free on gendisk (bsc#1135312).
- Bluetooth: Check key sizes only when Secure Simple Pairing is enabled
(bsc#1135556).
- bnxt_en: Free short FW command HWRM memory in error path in
bnxt_init_one() (bsc#1050242).
- bnxt_en: Improve multicast address setup logic
(networking-stable-19_05_04).
- bnxt_en: Improve RX consumer index validity check
(networking-stable-19_04_10).
- bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).
- bonding: fix event handling for stacked bonds
(networking-stable-19_04_19).
- bpf: add map_lookup_elem_sys_only for lookups from syscall side
(bsc#1083647).
- bpf: Add missed newline in verifier verbose log (bsc#1056787).
- bpf, lru: avoid messing with eviction heuristics upon syscall lookup
(bsc#1083647).
- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).
- brcmfmac: fix missing checks for kmemdup (bsc#1051510).
- brcmfmac: fix Oops when bringing up interface during USB disconnect
(bsc#1051510).
- brcmfmac: fix race during disconnect when USB completion is in progress
(bsc#1051510).
- brcmfmac: fix WARNING during USB disconnect in case of unempty psq
(bsc#1051510).
- btrfs: delayed-ref: Use btrfs_ref to refactor
btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor
btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: do not allow trimming when a fs is mounted with the nologreplay
option (bsc#1135758).
- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes
(bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes()
(bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent()
(bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref()
(bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: fix fsync not persisting changed attributes of a directory
(bsc#1137151).
- btrfs: fix race between ranged fsync and writeback of adjacent ranges
(bsc#1136477).
- btrfs: fix race updating log root item during fsync (bsc#1137153).
- btrfs: fix wrong ctime and mtime of a directory after log replay
(bsc#1137152).
- btrfs: improve performance on fsync of files with multiple hardlinks
(bsc#1123454).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer
dereference (bsc#1134806).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree
(bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON()
(bsc#1133612).
- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).
- btrfs: tree-checker: detect file extent items with overlapping ranges
(bsc#1136478).
- chardev: add additional check for minor range overlap (bsc#1051510).
- CIFS: keep FileInfo handle live during oplock break (bsc#1106284,
bsc#1131565).
- configfs: fix possible use-after-free in configfs_register_group
(bsc#1051510).
- configfs: Fix use-after-free when accessing sd->s_dentry (bsc#1051510).
- cpufreq: Add Hygon Dhyana support ().
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().
- crypto: caam - fix caam_dump_sg that iterates through scatterlist
(bsc#1051510).
- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661,
bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661,
bsc#1137162).
- dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).
- dccp: Fix memleak in __feat_register_sp (bsc#1051510).
- debugfs: fix use-after-free on symlink traversal (bsc#1051510).
- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).
- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).
- Documentation: Add MDS vulnerability documentation (bsc#1135642).
- Documentation: Correct the possible MDS sysfs values (bsc#1135642).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer
(bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote
(bsc#1051510).
- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).
- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).
- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).
- drm/drv: Hold ref on parent device during drm_device lifetime
(bsc#1051510).
- drm/etnaviv: lock MMU while dumping core (bsc#1113722)
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels
(bsc#1051510).
- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).
- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).
- drm/i915/fbc: disable framebuffer compression on GeminiLake
(bsc#1051510).
- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)
- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware
(bsc#1051510).
- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)
- drm/i915/gvt: refine ggtt range validation (bsc#1113722)
- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+
(bsc#1113722)
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO
(bsc#1051510).
- drm/imx: do not skip DP channel disable for background plane
(bsc#1051510).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link
configuration (bsc#1051510).
- drm/nouveau/i2c: Disable i2c bus access after ->fini() (bsc#1113722)
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- drm/rockchip: fix for mailbox read validation (bsc#1051510).
- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set
(bsc#1051510).
- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an
invalid read (bsc#1051510).
- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define()
(bsc#1113722)
- drm: Wake up next in drm_read() chain if we are forced to putback the
event (bsc#1051510).
- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).
- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).
- dt-bindings: net: Add binding for the external clock for TI WiLink
(bsc#1085535).
- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).
- EDAC, amd64: Add Hygon Dhyana support ().
- efi: add API to reserve memory persistently across kexec reboot
(bsc#1117158).
- efi/arm: Defer persistent reservations until after paging_init()
(bsc#1117158).
- efi/arm: Do not mark ACPI reclaim memory as MEMBLOCK_NOMAP (bsc#1117158
bsc#1115688 bsc#1120566).
- efi/arm: libstub: add a root memreserve config table (bsc#1117158).
- efi/arm: map UEFI memory map even w/o runtime services enabled
(bsc#1117158).
- efi/arm: preserve early mapping of UEFI memory map longer for BGRT
(bsc#1117158).
- efi/arm: Revert "Defer persistent reservations until after
paging_init()" (bsc#1117158).
- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).
- efi: honour memory reservations passed via a linux specific config table
(bsc#1117158).
- efi: Permit calling efi_mem_reserve_persistent() from atomic context
(bsc#1117158).
- efi: Permit multiple entries in persistent memreserve data structure
(bsc#1117158).
- efi: Prevent GICv3 WARN() by mapping the memreserve table before first
use (bsc#1117158).
- efi: Reduce the amount of memblock reservations for persistent
allocations (bsc#1117158).
- ext4: actually request zeroing of inode table after grow (bsc#1135315).
- ext4: avoid panic during forced reboot due to aborted journal
(bsc#1126356).
- ext4: fix data corruption caused by overlapping unaligned and aligned IO
(bsc#1136428).
- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).
- ext4: make sanity check in mballoc more strict (bsc#1136439).
- ext4: wait for outstanding dio during truncate in nojournal mode
(bsc#1136438).
- extcon: arizona: Disable mic detect if running when driver is removed
(bsc#1051510).
- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)
- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)
- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).
- fix rtnh_ok() (git-fixes).
- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback
(bsc#1136432).
- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going
into workqueue when umount (bsc#1136435).
- ftrace/x86_64: Emulate call function while updating in breakpoint
handler (bsc#1099658).
- fuse: fallocate: fix return with locked inode (bsc#1051510).
- fuse: fix writepages on 32bit (bsc#1051510).
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).
- genetlink: Fix a memory leak on error path (networking-stable-19_03_28).
- gpio: fix gpio-adp5588 build errors (bsc#1051510).
- gpio: Remove obsolete comment about gpiochip_free_hogs() usage
(bsc#1051510).
- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).
- HID: input: add mapping for Expose/Overview key (bsc#1051510).
- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys
(bsc#1051510).
- HID: input: add mapping for "Toggle Display" key (bsc#1051510).
- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- HID: logitech-hidpp: change low battery level threshold from 31 to 30
percent (bsc#1051510).
- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version
(bsc#1051510).
- HID: wacom: Add ability to provide explicit battery status info
(bsc#1051510).
- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- HID: wacom: Add support for Pro Pen slim (bsc#1051510).
- HID: wacom: convert Wacom custom usages to standard HID usages
(bsc#1051510).
- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth
(bsc#1051510).
- HID: wacom: Do not report anything prior to the tool entering range
(bsc#1051510).
- HID: wacom: Do not set tool type until we're in range (bsc#1051510).
- HID: wacom: fix mistake in printk (bsc#1051510).
- HID: wacom: generic: add the "Report Valid" usage (bsc#1051510).
- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- HID: wacom: generic: Leave tool in prox until it completely leaves sense
(bsc#1051510).
- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).
- HID: wacom: generic: Report AES battery information (bsc#1051510).
- HID: wacom: generic: Reset events back to zero when pen leaves
(bsc#1051510).
- HID: wacom: generic: Scale battery capacity measurements to percentages
(bsc#1051510).
- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set
(bsc#1051510).
- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range
(bsc#1051510).
- HID: wacom: generic: Support multiple tools per report (bsc#1051510).
- HID: wacom: generic: Use generic codepath terminology in
wacom_wac_pen_report (bsc#1051510).
- HID: wacom: Mark expected switch fall-through (bsc#1051510).
- HID: wacom: Move handling of HID quirks into a dedicated function
(bsc#1051510).
- HID: wacom: Move HID fix for AES serial number into
wacom_hid_usage_quirk (bsc#1051510).
- HID: wacom: Properly handle AES serial number and tool type
(bsc#1051510).
- HID: wacom: Queue events with missing type/serial data for later
processing (bsc#1051510).
- HID: wacom: Remove comparison of u8 mode with zero and simplify
(bsc#1051510).
- HID: wacom: Replace touch_max fixup code with static touch_max
definitions (bsc#1051510).
- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact
(bsc#1051510).
- HID: wacom: Support "in range" for Intuos/Bamboo tablets where possible
(bsc#1051510).
- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary
(bsc#1051510).
- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452
(bsc#1051510).
- hwmon: (core) add thermal sensors only if dev->of_node is present
(bsc#1051510).
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages
(bsc#1051510).
- hwrng: omap - Set default quality (bsc#1051510).
- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).
- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- igmp: fix incorrect unsolicit report count when join group (git-fixes).
- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).
- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion
(bsc#1051510).
- iio: common: ssp_sensors: Initialize calculated_time in
ssp_common_process_data (bsc#1051510).
- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).
- indirect call wrappers: helpers to speed-up indirect calls of builtin
(bsc#1124503).
- inetpeer: fix uninit-value in inet_getpeer (git-fixes).
- Input: elan_i2c - add hardware ID for multiple Lenovo laptops
(bsc#1051510).
- Input: synaptics-rmi4 - fix possible double free (bsc#1051510).
- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump
kernel (bsc#1117158).
- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158
bsc#1134671).
- ip6_tunnel: collect_md xmit: Use ip_tunnel_key's provided src address
(git-fixes).
- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type
(networking-stable-19_04_10).
- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).
- ip_gre: fix parsing gre header in ipgre_err (git-fixes).
- ip_tunnel: Fix name string concatenate in __ip_tunnel_create()
(git-fixes).
- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).
- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled
(git-fixes).
- ipv4: ensure rcu_read_lock() in ipv4_link_failure()
(networking-stable-19_04_19).
- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation
(networking-stable-19_05_04).
- ipv4: recompile ip options in ipv4_link_failure
(networking-stable-19_04_19).
- ipv4: set the tcp_min_rtt_wlen range from 0 to one day
(networking-stable-19_04_30).
- ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).
- ipv6: fix cleanup ordering for pingv6 registration (git-fixes).
- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).
- ipv6: invert flowlabel sharing check in process and user mode
(git-fixes).
- ipv6: mcast: fix unsolicited report interval after receiving querys
(git-fixes).
- ipvlan: Add the skb->mark as flow4's member to lookup route
(bsc#1051510).
- ipvlan: fix ipv6 outbound device (bsc#1051510).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).
- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).
- ipvs: fix buffer overflow with sync daemon and service (git-fixes).
- ipvs: fix check on xmit to non-local addresses (git-fixes).
- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest()
(bsc#1051510).
- ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).
- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).
- ipvs: fix stats update from local clients (git-fixes).
- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).
- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb()
(bsc#1051510).
- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).
- jbd2: check superblock mapped prior to committing (bsc#1136430).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout
(bsc#1137586).
- kABI workaround for the new pci_dev.skip_bus_pm field addition
(bsc#1051510).
- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).
- kernel/sys.c: prctl: fix false positive in validate_prctl_map()
(git-fixes).
- keys: safe concurrent user->{session,uid}_keyring access (bsc#1135642).
- kmsg: Update message catalog to latest IBM level (2019/03/08)
(bsc#1128904 LTC#176078).
- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers
(bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough
interrupts (bsc#1061840).
- KVM: PPC: Book3S: Protect memslots while validating user address
(bsc#1061840).
- KVM: PPC: Release all hardware TCE tables attached to a group
(bsc#1061840).
- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).
- KVM: PPC: Validate all tces before updating tables (bsc#1061840).
- KVM: PPC: Validate TCEs against preregistered memory page sizes
(bsc#1061840).
- KVM: s390: fix memory overwrites when not using SCA entries
(bsc#1136206).
- KVM: s390: provide io interrupt kvm_stat (bsc#1136206).
- KVM: s390: use created_vcpus in more places (bsc#1136206).
- KVM: s390: vsie: fix < 8k check for the itdba (bsc#1136206).
- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).
- l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).
- l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).
- l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).
- l2tp: prevent pppol2tp_connect() from creating kernel sockets
(git-fixes).
- l2tp: revert "l2tp: fix missing print session offset info" (bsc#1051510).
- leds: avoid flush_work in atomic context (bsc#1051510).
- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).
- livepatch: Convert error about unsupported reliable stacktrace into a
warning (bsc#1071995).
- livepatch: Remove custom kobject state handling (bsc#1071995).
- livepatch: Remove duplicated code for early initialization (bsc#1071995).
- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).
- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).
- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).
- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).
- mac8390: Fix mmio access size probe (bsc#1051510).
- MD: fix invalid stored role for a disk (bsc#1051510).
- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).
- media: au0828: Fix NULL pointer dereference in
au0828_analog_stream_enable() (bsc#1051510).
- media: au0828: stop video streaming only when last user stops
(bsc#1051510).
- media: coda: clear error return value before picture run (bsc#1051510).
- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).
- media: davinci/vpbe: array underflow in vpbe_enum_outputs()
(bsc#1051510).
- media: go7007: avoid clang frame overflow warning with KASAN
(bsc#1051510).
- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend
(bsc#1051510).
- media: omap_vout: potential buffer overflow in vidioc_dqbuf()
(bsc#1051510).
- media: ov2659: make S_FMT succeed even if requested format does not
match (bsc#1051510).
- media: saa7146: avoid high stack usage with clang (bsc#1051510).
- media: smsusb: better handle optional alignment (bsc#1051510).
- media: usb: siano: Fix false-positive "uninitialized variable" warning
(bsc#1051510).
- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).
- memcg: make it work on sparse non-0-node systems (bnc#1133616).
- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).
- mfd: da9063: Fix OTP control register names to match datasheets for
DA9063/63L (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mISDN: Check address length before reading address family (bsc#1051510).
- mlxsw: spectrum: Fix autoneg status in ethtool
(networking-stable-19_04_30).
- mmc: block: Delete gendisk before cleaning up the request queue
(bsc#1127616).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers
(bsc#1051510).
- mmc: core: Verify SD bus width (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context
(bsc#1051510).
- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time
problem (bsc#1051510).
- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem
(bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support
(bsc#1051510).
- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).
- mm-Fix-modifying-of-page-protection-by-insert_pfn.patch: Fix buggy
backport leading to MAP_SYNC failures (bsc#1137372)
- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned
addresses (bsc#1135330).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- mount: copy the port field into the cloned nfs_server structure
(bsc#1136990).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- mwifiex: Fix possible buffer overflows at parsing bss descriptor
- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).
- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6
(networking-stable-19_03_28).
- net: atm: Fix potential Spectre v1 vulnerabilities
(networking-stable-19_04_19).
- net: do not keep lonely packets forever in the gro hash (git-fixes).
- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc
(networking-stable-19_05_04).
- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT
(git-fixes).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696
bsc#1117561).
- net: ethtool: not call vzalloc for zero sized memory request
(networking-stable-19_04_10).
- netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev
(git-fixes).
- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule
(git-fixes).
- netfilter: ebtables: handle string from userspace with care (git-fixes).
- netfilter: ebtables: reject non-bridge targets (git-fixes).
- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel
(git-fixes).
- netfilter: nf_log: do not hold nf_log_mutex during user access
(git-fixes).
- netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).
- netfilter: nf_tables: can't fail after linking rule into active rule
list (git-fixes).
- netfilter: nf_tables: check msg_type before nft_trans_set(trans)
(git-fixes).
- netfilter: nf_tables: fix leaking object reference count (git-fixes).
- netfilter: nf_tables: fix NULL pointer dereference on
nft_ct_helper_obj_dump() (git-fixes).
- netfilter: nf_tables: release chain in flushing set (git-fixes).
- netfilter: nft_compat: do not dump private area (git-fixes).
- netfilter: x_tables: initialise match/target check parameter struct
(git-fixes).
- net: Fix a bug in removing queues from XPS map (git-fixes).
- net: fix uninit-value in __hw_addr_add_ex() (git-fixes).
- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv
(networking-stable-19_04_19).
- net-gro: Fix GRO flush when receiving a GSO packet
(networking-stable-19_04_10).
- net: hns3: remove resetting check in hclgevf_reset_task_schedule
(bsc#1104353 bsc#1135056).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net: initialize skb->peeked when cloning (git-fixes).
- net/ipv4: defensive cipso option parsing (git-fixes).
- net/ipv6: do not reinitialize ndev->cnf.addr_gen_mode on new inet6_dev
(git-fixes).
- net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).
- net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices
(git-fixes).
- net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).
- netlink: fix uninit-value in netlink_sendmsg (git-fixes).
- net: make skb_partial_csum_set() more robust against overflows
(git-fixes).
- net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).
- net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).
- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query
(networking-stable-19_04_30).
- net/mlx5e: Fix error handling when refreshing TIRs
(networking-stable-19_04_10).
- net/mlx5e: Fix trailing semicolon (bsc#1075020).
- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).
- net: phy: marvell: Fix buffer overrun with stats counters
(networking-stable-19_05_04).
- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).
- net: rose: fix a possible stack overflow (networking-stable-19_03_28).
- net/rose: fix unbound loop in rose_loopback_timer()
(networking-stable-19_04_30).
- net/sched: act_sample: fix divide by zero in the traffic path
(networking-stable-19_04_10).
- net/sched: do not dereference a->goto_chain to read the chain index
(bsc#1064802 bsc#1066129).
- net/sched: fix ->get helper of the matchall cls
(networking-stable-19_04_10).
- net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).
- net: stmmac: fix memory corruption with large MTUs
(networking-stable-19_03_28).
- net: stmmac: move stmmac_check_ether_addr() to driver probe
(networking-stable-19_04_30).
- net: test tailroom before appending to linear skb (git-fixes).
- net: thunderx: do not allow jumbo frames with XDP
(networking-stable-19_04_19).
- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).
- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).
- net: use indirect call wrappers at GRO network layer (bsc#1124503).
- net: use indirect call wrappers at GRO transport layer (bsc#1124503).
- NFS add module option to limit NFSv4 minor version (jsc#PM-231).
- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands
(bsc#1051510).
- nvme: Do not remove namespaces during reset (bsc#1131673).
- nvme: flush scan_work when resetting controller (bsc#1131673).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us
(bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support
(bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function
(bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- nvme-rdma: fix possible free of a non-allocated async event buffer
(bsc#1120423).
- nvme: skip nvme_update_disk_info() if the controller is not live
(bsc#1128432).
- objtool: Fix function fallthrough detection (bsc#1058115).
- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- packet: fix reserve calculation (git-fixes).
- packet: in packet_snd start writing at link layer allocation (git-fixes).
- packet: refine ring v3 block size test to hold one frame (git-fixes).
- packet: reset network header if packet shorter than ll reserved space
(git-fixes).
- packets: Always register packet sk in the same order
(networking-stable-19_03_28).
- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).
- PCI: endpoint: Use EPC's device in
dma_alloc_coherent()/dma_free_coherent() (git-fixes).
- PCI: Factor out pcie_retrain_link() function (git-fixes).
- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).
- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).
- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- PCI: Work around Pericom PCIe-to-PCI bridge Retrain Link erratum
(git-fixes).
- perf tools: Add Hygon Dhyana support ().
- platform/chrome: cros_ec_proto: check for NULL transfer function
(bsc#1051510).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device
registration (bsc#1051510).
- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems
DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add several Beckhoff Automation boards to
critclk_systems DMI table (bsc#1051510).
- PM / core: Propagate dev->power.wakeup_path when no callbacks
(bsc#1051510).
- powerpc: Always initialize input array when calling epapr_hypercall()
(bsc#1065729).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild
(bsc#1138374, LTC#178199).
- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).
- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).
- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).
- powerpc/process: Fix sparse address space warnings (bsc#1065729).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375,
LTC#178204).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update
(bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration
(bsc#1138374, LTC#178199).
- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros
(bsc#1051510).
- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with
CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK
(git-fixes).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- RDMA/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).
- RDMA/rxe: Consider skb reserve space based on netdev of GID
(bsc#1082387, bsc#1103992).
- Revert "ALSA: hda/realtek - Improve the headset mic for Acer Aspire
laptops" (bsc#1051510).
- Revert "HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen
enters range" (bsc#1051510).
- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).
- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).
- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).
- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).
- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).
- rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).
- rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket
(git-fixes).
- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).
- scsi: qedf: fixup bit operations (bsc#1135542).
- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).
- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).
- scsi: qla2xxx: Declare local functions 'static' (bsc#1137444).
- scsi: qla2xxx: fix error message on <qla2400 (bsc#1118139).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).
- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).
- scsi: qla2xxx: fix spelling mistake: "existant" -> "existent"
(bsc#1118139).
- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).
- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).
- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp()
(bsc#1137444).
- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze
(bsc#1137444).
- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes
'res' (bsc#1137444).
- scsi: qla2xxx: NULL check before some freeing functions is not needed
(bsc#1137444).
- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).
- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry()
(bsc#1137444).
- scsi: qla2xxx: Remove unused symbols (bsc#1118139).
- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function
(bsc#1137444).
- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of
reinventing them (bsc#1137444).
- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).
- sctp: avoid running the sctp state machine recursively
(networking-stable-19_05_04).
- sctp: fix identification of new acks for SFR-CACC (git-fixes).
- sctp: get sctphdr by offset in sctp_compute_cksum
(networking-stable-19_03_28).
- sctp: initialize _pad of sockaddr_in before copying to user memory
(networking-stable-19_04_10).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- signal: Always notice exiting tasks (git-fixes).
- signal: Better detection of synchronous signals (git-fixes).
- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).
- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master
(bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: Micrel eth switch: declare missing of table (bsc#1051510).
- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end
(bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: vc04_services: Fix a couple error codes (bsc#1051510).
- staging: vc04_services: prevent integer overflow in create_pagelist()
(bsc#1051510).
- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).
- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).
- switchtec: Fix unintended mask of MRPC event (git-fixes).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: purge write queue in tcp_connect_init() (git-fixes).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- tcp: tcp_grow_window() needs to respect tcp_space()
(networking-stable-19_04_19).
- team: fix possible recursive locking when add slaves
(networking-stable-19_04_30).
- team: set slave to promisc if team is already in promisc mode
(bsc#1051510).
- test_firmware: Use correct snprintf() limit (bsc#1135642).
- thermal: cpu_cooling: Actually trace CPU load in
thermal_power_cpu_get_power (bsc#1051510).
- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).
- thunderx: eliminate extra calls to put_page() for pages held for
recycling (networking-stable-19_03_28).
- thunderx: enable page recycling for non-XDP case
(networking-stable-19_03_28).
- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).
- tipc: missing entries in name table of publications
(networking-stable-19_04_19).
- tools/cpupower: Add Hygon Dhyana support ().
- tools lib traceevent: Fix missing equality check for strcmp
(bsc#1129770).
- tracing: Fix partial reading of trace event's id file (bsc#1136573).
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).
- TTY: serial_core, add ->install (bnc#1129693).
- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).
- tun: add a missing rcu_read_unlock() in error path
(networking-stable-19_03_28).
- tun: properly test for IFF_UP (networking-stable-19_03_28).
- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).
- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour
(bsc#1135323).
- Update config files: CONFIG_NVMEM_IMX_OCOTP=m for armvh7hl/lpae
- Update config files. Debug kernel is not supported (bsc#1135492).
- Update config files: disable CONFIG_IDE on ppc64le
- Update config files for NFSv4.2 Enable NFSv4.2 support - jsc@PM-231 This
requires a module parameter for NFSv4.2 to actually be available on
SLE12 and SLE15-SP0
- Update cx2072x patches to follow the upstream development (bsc#1068546)
- Update patch reference for ipmi_ssif fix (bsc#1135120)
- usb: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).
- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown
(bsc#1051510).
- usb: core: Do not unbind interfaces following device reset failure
(bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: Fix slab-out-of-bounds write in usb_get_bos_descriptor
(bsc#1051510).
- usbip: usbip_host: fix BUG: sleeping function called from invalid
context (bsc#1051510).
- usbip: usbip_host: fix stub_dev lock context imbalance regression
(bsc#1051510).
- usbnet: fix kernel crash after disconnect (bsc#1051510).
- usb: rio500: fix memory leak in close after disconnect (bsc#1051510).
- usb: rio500: refuse more than one device at a time (bsc#1051510).
- usb: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).
- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).
- vhost: reject zero size iova range (networking-stable-19_04_19).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vrf: check accept_source_route on the original netdevice
(networking-stable-19_04_10).
- vsock/virtio: Initialize core virtio vsock before registering the driver
(bsc#1051510).
- vt: always call notifier with the console lock held (bsc#1051510).
- vxlan: Do not call gro_cells_destroy() before device is unregistered
(networking-stable-19_03_28).
- vxlan: trivial indenting fix (bsc#1051510).
- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete
(bsc#1051510).
- w1: fix the resume command API (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- x86/alternative: Init ideal_nops for Hygon Dhyana ().
- x86/amd_nb: Check vendor in AMD-only functions ().
- x86/apic: Add Hygon Dhyana support ().
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().
- x86/cpu: Create Hygon Dhyana architecture support file ().
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().
- x86/events: Add Hygon Dhyana support to PMU infrastructure ().
- x86/kvm: Add Hygon Dhyana support to KVM ().
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().
- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/xen: Add Hygon Dhyana support to Xen ().
- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and
xenbus_file_write() (bsc#1065600).
- xen/pciback: Do not disable PCI_COMMAND on PCI device reset
(bsc#1065600).
- xfrm6: avoid potential infinite loop in _decode_session6() (git-fixes).
- xfrm6: call kfree_skb when skb is toobig (git-fixes).
- xfrm: fix missing dst_release() after policy blocking lbcast and
multicast (git-fixes).
- xfrm: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- xfrm: reset crypto_done when iterating over multiple input xfrms
(git-fixes).
- xfrm: reset transport header back to network header after all input
transforms ahave been applied (git-fixes).
- xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).
- xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).
- xfs: add log item pinning error injection tag (bsc#1114427).
- xfs: buffer lru reference count error injection tag (bsc#1114427).
- xfs: check _btree_check_block value (bsc#1123663).
- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).
- xfs: create block pointer check functions (bsc#1123663).
- xfs: create inode pointer verifiers (bsc#1114427).
- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub
(bsc#1114427).
- xfs: export various function for the online scrubber (bsc#1123663).
- xfs: expose errortag knobs via sysfs (bsc#1114427).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).
- xfs: force summary counter recalc at next mount (bsc#1114427).
- xfs: make errortag a per-mountpoint structure (bsc#1123663).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset
(bsc#1138014).
- xfs: move error injection tags into their own file (bsc#1114427).
- xfs: refactor btree block header checking functions (bsc#1123663).
- xfs: refactor btree pointer checks (bsc#1123663).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: refactor unmount record write (bsc#1114427).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: replace log_badcrc_factor knob with error injection tag
(bsc#1114427).
- xfs: sanity-check the unused space before trying to use it (bsc#1123663).
- xfs: serialize unaligned dio writes against all other dio writes
(bsc#1134936).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly
(bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate
(bsc#1137998).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic()
(bsc#1051510).
- xhci: Use %zu for printing size_t type (bsc#1051510).
- xhci: update bounce buffer with correct sg num (bsc#1051510).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1579=1
Package List:
- openSUSE Leap 15.0 (noarch):
kernel-devel-4.12.14-lp150.12.64.1
kernel-docs-4.12.14-lp150.12.64.1
kernel-docs-html-4.12.14-lp150.12.64.1
kernel-macros-4.12.14-lp150.12.64.1
kernel-source-4.12.14-lp150.12.64.1
kernel-source-vanilla-4.12.14-lp150.12.64.1
- openSUSE Leap 15.0 (x86_64):
kernel-debug-4.12.14-lp150.12.64.1
kernel-debug-base-4.12.14-lp150.12.64.1
kernel-debug-base-debuginfo-4.12.14-lp150.12.64.1
kernel-debug-debuginfo-4.12.14-lp150.12.64.1
kernel-debug-debugsource-4.12.14-lp150.12.64.1
kernel-debug-devel-4.12.14-lp150.12.64.1
kernel-debug-devel-debuginfo-4.12.14-lp150.12.64.1
kernel-default-4.12.14-lp150.12.64.1
kernel-default-base-4.12.14-lp150.12.64.1
kernel-default-base-debuginfo-4.12.14-lp150.12.64.1
kernel-default-debuginfo-4.12.14-lp150.12.64.1
kernel-default-debugsource-4.12.14-lp150.12.64.1
kernel-default-devel-4.12.14-lp150.12.64.1
kernel-default-devel-debuginfo-4.12.14-lp150.12.64.1
kernel-kvmsmall-4.12.14-lp150.12.64.1
kernel-kvmsmall-base-4.12.14-lp150.12.64.1
kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.64.1
kernel-kvmsmall-debuginfo-4.12.14-lp150.12.64.1
kernel-kvmsmall-debugsource-4.12.14-lp150.12.64.1
kernel-kvmsmall-devel-4.12.14-lp150.12.64.1
kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.64.1
kernel-obs-build-4.12.14-lp150.12.64.1
kernel-obs-build-debugsource-4.12.14-lp150.12.64.1
kernel-obs-qa-4.12.14-lp150.12.64.1
kernel-syms-4.12.14-lp150.12.64.1
kernel-vanilla-4.12.14-lp150.12.64.1
kernel-vanilla-base-4.12.14-lp150.12.64.1
kernel-vanilla-base-debuginfo-4.12.14-lp150.12.64.1
kernel-vanilla-debuginfo-4.12.14-lp150.12.64.1
kernel-vanilla-debugsource-4.12.14-lp150.12.64.1
kernel-vanilla-devel-4.12.14-lp150.12.64.1
kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.64.1
References:
https://www.suse.com/security/cve/CVE-2018-7191.html
https://www.suse.com/security/cve/CVE-2019-10124.html
https://www.suse.com/security/cve/CVE-2019-11085.html
https://www.suse.com/security/cve/CVE-2019-11477.html
https://www.suse.com/security/cve/CVE-2019-11478.html
https://www.suse.com/security/cve/CVE-2019-11479.html
https://www.suse.com/security/cve/CVE-2019-11487.html
https://www.suse.com/security/cve/CVE-2019-11833.html
https://www.suse.com/security/cve/CVE-2019-12380.html
https://www.suse.com/security/cve/CVE-2019-12382.html
https://www.suse.com/security/cve/CVE-2019-12456.html
https://www.suse.com/security/cve/CVE-2019-12818.html
https://www.suse.com/security/cve/CVE-2019-12819.html
https://www.suse.com/security/cve/CVE-2019-3846.html
https://www.suse.com/security/cve/CVE-2019-5489.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1050242
https://bugzilla.suse.com/1051510
https://bugzilla.suse.com/1053043
https://bugzilla.suse.com/1056787
https://bugzilla.suse.com/1058115
https://bugzilla.suse.com/1061840
https://bugzilla.suse.com/1063638
https://bugzilla.suse.com/1064802
https://bugzilla.suse.com/1065600
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1066129
https://bugzilla.suse.com/1068546
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1075020
https://bugzilla.suse.com/1082387
https://bugzilla.suse.com/1083647
https://bugzilla.suse.com/1085535
https://bugzilla.suse.com/1099658
https://bugzilla.suse.com/1103992
https://bugzilla.suse.com/1104353
https://bugzilla.suse.com/1104427
https://bugzilla.suse.com/1106284
https://bugzilla.suse.com/1108838
https://bugzilla.suse.com/1111696
https://bugzilla.suse.com/1113722
https://bugzilla.suse.com/1114427
https://bugzilla.suse.com/1115688
https://bugzilla.suse.com/1117158
https://bugzilla.suse.com/1117561
https://bugzilla.suse.com/1118139
https://bugzilla.suse.com/1120091
https://bugzilla.suse.com/1120423
https://bugzilla.suse.com/1120566
https://bugzilla.suse.com/1120843
https://bugzilla.suse.com/1120902
https://bugzilla.suse.com/1123454
https://bugzilla.suse.com/1123663
https://bugzilla.suse.com/1124503
https://bugzilla.suse.com/1126356
https://bugzilla.suse.com/1127616
https://bugzilla.suse.com/1128052
https://bugzilla.suse.com/1128432
https://bugzilla.suse.com/1128904
https://bugzilla.suse.com/1129693
https://bugzilla.suse.com/1129770
https://bugzilla.suse.com/1130699
https://bugzilla.suse.com/1131565
https://bugzilla.suse.com/1131673
https://bugzilla.suse.com/1133190
https://bugzilla.suse.com/1133320
https://bugzilla.suse.com/1133612
https://bugzilla.suse.com/1133616
https://bugzilla.suse.com/1134597
https://bugzilla.suse.com/1134671
https://bugzilla.suse.com/1134806
https://bugzilla.suse.com/1134936
https://bugzilla.suse.com/1135056
https://bugzilla.suse.com/1135120
https://bugzilla.suse.com/1135278
https://bugzilla.suse.com/1135281
https://bugzilla.suse.com/1135309
https://bugzilla.suse.com/1135312
https://bugzilla.suse.com/1135314
https://bugzilla.suse.com/1135315
https://bugzilla.suse.com/1135316
https://bugzilla.suse.com/1135320
https://bugzilla.suse.com/1135323
https://bugzilla.suse.com/1135330
https://bugzilla.suse.com/1135492
https://bugzilla.suse.com/1135542
https://bugzilla.suse.com/1135556
https://bugzilla.suse.com/1135603
https://bugzilla.suse.com/1135642
https://bugzilla.suse.com/1135661
https://bugzilla.suse.com/1135758
https://bugzilla.suse.com/1136206
https://bugzilla.suse.com/1136424
https://bugzilla.suse.com/1136428
https://bugzilla.suse.com/1136430
https://bugzilla.suse.com/1136432
https://bugzilla.suse.com/1136434
https://bugzilla.suse.com/1136435
https://bugzilla.suse.com/1136438
https://bugzilla.suse.com/1136439
https://bugzilla.suse.com/1136477
https://bugzilla.suse.com/1136478
https://bugzilla.suse.com/1136573
https://bugzilla.suse.com/1136586
https://bugzilla.suse.com/1136598
https://bugzilla.suse.com/1136881
https://bugzilla.suse.com/1136922
https://bugzilla.suse.com/1136935
https://bugzilla.suse.com/1136990
https://bugzilla.suse.com/1137151
https://bugzilla.suse.com/1137152
https://bugzilla.suse.com/1137153
https://bugzilla.suse.com/1137162
https://bugzilla.suse.com/1137372
https://bugzilla.suse.com/1137429
https://bugzilla.suse.com/1137444
https://bugzilla.suse.com/1137586
https://bugzilla.suse.com/1137739
https://bugzilla.suse.com/1137752
https://bugzilla.suse.com/1137995
https://bugzilla.suse.com/1137996
https://bugzilla.suse.com/1137998
https://bugzilla.suse.com/1137999
https://bugzilla.suse.com/1138000
https://bugzilla.suse.com/1138002
https://bugzilla.suse.com/1138003
https://bugzilla.suse.com/1138005
https://bugzilla.suse.com/1138006
https://bugzilla.suse.com/1138007
https://bugzilla.suse.com/1138008
https://bugzilla.suse.com/1138009
https://bugzilla.suse.com/1138010
https://bugzilla.suse.com/1138011
https://bugzilla.suse.com/1138012
https://bugzilla.suse.com/1138013
https://bugzilla.suse.com/1138014
https://bugzilla.suse.com/1138015
https://bugzilla.suse.com/1138016
https://bugzilla.suse.com/1138017
https://bugzilla.suse.com/1138018
https://bugzilla.suse.com/1138019
https://bugzilla.suse.com/1138291
https://bugzilla.suse.com/1138293
https://bugzilla.suse.com/1138374
https://bugzilla.suse.com/1138375
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1583-1: important: Security update for MozillaThunderbird
by opensuse-security@opensuse.org 18 Jun '19
by opensuse-security@opensuse.org 18 Jun '19
18 Jun '19
openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1583-1
Rating: important
References: #1137595
Cross-References: CVE-2019-11703 CVE-2019-11704 CVE-2019-11705
CVE-2019-11706
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for MozillaThunderbird fixes the following security issues:
- CVE-2019-11703: Fixed a heap-based buffer overflow in
icalmemorystrdupanddequote() (bsc#1137595).
- CVE-2019-11704: Fixed a heap-based buffer overflow in
parser_get_next_char() (bsc#1137595).
- CVE-2019-11705: Fixed a stack-based buffer overflow in
icalrecur_add_bydayrules() (bsc#1137595).
- CVE-2019-11706: Fixed a type confusion in
icaltimezone_get_vtimezone_properties() (bsc#1137595).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-1583=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1583=1
Package List:
- openSUSE Leap 15.1 (x86_64):
MozillaThunderbird-60.7.0-lp151.2.4.1
MozillaThunderbird-buildsymbols-60.7.0-lp151.2.4.1
MozillaThunderbird-debuginfo-60.7.0-lp151.2.4.1
MozillaThunderbird-debugsource-60.7.0-lp151.2.4.1
MozillaThunderbird-translations-common-60.7.0-lp151.2.4.1
MozillaThunderbird-translations-other-60.7.0-lp151.2.4.1
- openSUSE Leap 15.0 (x86_64):
MozillaThunderbird-60.7.0-lp150.3.41.1
MozillaThunderbird-buildsymbols-60.7.0-lp150.3.41.1
MozillaThunderbird-debuginfo-60.7.0-lp150.3.41.1
MozillaThunderbird-debugsource-60.7.0-lp150.3.41.1
MozillaThunderbird-translations-common-60.7.0-lp150.3.41.1
MozillaThunderbird-translations-other-60.7.0-lp150.3.41.1
References:
https://www.suse.com/security/cve/CVE-2019-11703.html
https://www.suse.com/security/cve/CVE-2019-11704.html
https://www.suse.com/security/cve/CVE-2019-11705.html
https://www.suse.com/security/cve/CVE-2019-11706.html
https://bugzilla.suse.com/1137595
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1577-1: important: Security update for MozillaThunderbird
by opensuse-security@opensuse.org 18 Jun '19
by opensuse-security@opensuse.org 18 Jun '19
18 Jun '19
openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1577-1
Rating: important
References: #1137595
Cross-References: CVE-2019-11703 CVE-2019-11704 CVE-2019-11705
CVE-2019-11706
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for MozillaThunderbird fixes the following issues:
Mozilla Thunderbird was updated to 60.7.1:
Security issues fixed with MFSA 2019-17 (boo#1137595)
- CVE-2019-11703: Fixed a heap-based buffer overflow in
icalmemorystrdupanddequote() (bsc#1137595).
- CVE-2019-11704: Fixed a heap-based buffer overflow in
parser_get_next_char() (bsc#1137595).
- CVE-2019-11705: Fixed a stack-based buffer overflow in
icalrecur_add_bydayrules() (bsc#1137595).
- CVE-2019-11706: Fixed a type confusion in
icaltimezone_get_vtimezone_properties() (bsc#1137595).
Also fixed:
- No prompt for smartcard PIN when S/MIME signing is used
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1577=1
Package List:
- openSUSE Leap 42.3 (x86_64):
MozillaThunderbird-60.7.1-95.1
MozillaThunderbird-buildsymbols-60.7.1-95.1
MozillaThunderbird-debuginfo-60.7.1-95.1
MozillaThunderbird-debugsource-60.7.1-95.1
MozillaThunderbird-translations-common-60.7.1-95.1
MozillaThunderbird-translations-other-60.7.1-95.1
References:
https://www.suse.com/security/cve/CVE-2019-11703.html
https://www.suse.com/security/cve/CVE-2019-11704.html
https://www.suse.com/security/cve/CVE-2019-11705.html
https://www.suse.com/security/cve/CVE-2019-11706.html
https://bugzilla.suse.com/1137595
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1578-1: moderate: Security update for postgresql10
by opensuse-security@opensuse.org 18 Jun '19
by opensuse-security@opensuse.org 18 Jun '19
18 Jun '19
openSUSE Security Update: Security update for postgresql10
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1578-1
Rating: moderate
References: #1134689
Cross-References: CVE-2019-10130
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for postgresql10 fixes the following issues:
Security issue fixed:
- CVE-2019-10130: Prevent row-level security policies from being bypassed
via selectivity estimators (bsc#1134689).
Bug fixes:
- For a complete list of fixes check the release notes.
* https://www.postgresql.org/docs/10/release-10-8.html
* https://www.postgresql.org/docs/10/release-10-7.html
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1578=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
libecpg6-10.8-8.1
libecpg6-debuginfo-10.8-8.1
libpq5-10.8-8.1
libpq5-debuginfo-10.8-8.1
postgresql10-10.8-8.1
postgresql10-contrib-10.8-8.1
postgresql10-contrib-debuginfo-10.8-8.1
postgresql10-debuginfo-10.8-8.1
postgresql10-debugsource-10.8-8.1
postgresql10-devel-10.8-8.1
postgresql10-devel-debuginfo-10.8-8.1
postgresql10-libs-debugsource-10.8-8.1
postgresql10-plperl-10.8-8.1
postgresql10-plperl-debuginfo-10.8-8.1
postgresql10-plpython-10.8-8.1
postgresql10-plpython-debuginfo-10.8-8.1
postgresql10-pltcl-10.8-8.1
postgresql10-pltcl-debuginfo-10.8-8.1
postgresql10-server-10.8-8.1
postgresql10-server-debuginfo-10.8-8.1
postgresql10-test-10.8-8.1
- openSUSE Leap 42.3 (noarch):
postgresql10-docs-10.8-8.1
- openSUSE Leap 42.3 (x86_64):
libecpg6-32bit-10.8-8.1
libecpg6-debuginfo-32bit-10.8-8.1
libpq5-32bit-10.8-8.1
libpq5-debuginfo-32bit-10.8-8.1
References:
https://www.suse.com/security/cve/CVE-2019-10130.html
https://bugzilla.suse.com/1134689
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1573-1: moderate: Security update for php7
by opensuse-security@opensuse.org 18 Jun '19
by opensuse-security@opensuse.org 18 Jun '19
18 Jun '19
openSUSE Security Update: Security update for php7
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1573-1
Rating: moderate
References: #1118832 #1119396 #1126711 #1126713 #1126821
#1126823 #1126827 #1127122 #1128722 #1128883
#1128886 #1128887 #1128889 #1128892 #1129032
#1132837 #1132838 #1134322
Cross-References: CVE-2018-19935 CVE-2018-20783 CVE-2019-11034
CVE-2019-11035 CVE-2019-11036 CVE-2019-9020
CVE-2019-9021 CVE-2019-9022 CVE-2019-9023
CVE-2019-9024 CVE-2019-9637 CVE-2019-9638
CVE-2019-9639 CVE-2019-9640 CVE-2019-9641
CVE-2019-9675
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves 16 vulnerabilities and has two fixes
is now available.
Description:
This update for php7 fixes the following issues:
Security issues fixed:
- CVE-2019-9637: Fixed improper implementation of rename function and
multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9675: Fixed improper implementation of rename function and
multiple invalid memory access in EXIF extension (bsc#1128886).
- CVE-2019-9638: Fixed improper implementation of rename function and
multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and
multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and
multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9022: Fixed a vulnerability which could allow a hostile DNS
server to make PHP misuse memcpy (bsc#1126827).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which
could allow to a hostile XMLRPC server to cause memory read outside the
allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function
(bsc#1126711).
- CVE-2018-20783: Fixed a buffer over-read in PHAR reading functions which
could allow an attacker to read allocated and unallocated memory when
parsing a phar file (bsc#1127122).
- CVE-2019-9021: Fixed a heap buffer-based buffer over-read in PHAR
reading functions which could allow an attacker to read allocated and
unallocated memory when parsing a phar file (bsc#1126713).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in
mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension
and improved insecure implementation
of rename function (bsc#1128722).
- CVE-2018-19935: Fixed a Denial of Service in php_imap.c which could be
triggered via an empty string in the message argument to imap_mail
(bsc#1118832).
- CVE-2019-11034: Fixed a heap-buffer overflow in php_ifd_get32si()
(bsc#1132838).
- CVE-2019-11035: Fixed a heap-buffer overflow in exif_iif_add_value()
(bsc#1132837).
- CVE-2019-11036: Fixed buffer over-read in exif_process_IFD_TAG function
leading to information disclosure (bsc#1134322).
Other issue addressed:
- Deleted README.default_socket_timeout which is not needed anymore
(bsc#1129032).
- Enabled php7 testsuite (bsc#1119396).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1573=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
apache2-mod_php7-7.2.5-lp150.2.19.1
apache2-mod_php7-debuginfo-7.2.5-lp150.2.19.1
php7-7.2.5-lp150.2.19.1
php7-bcmath-7.2.5-lp150.2.19.1
php7-bcmath-debuginfo-7.2.5-lp150.2.19.1
php7-bz2-7.2.5-lp150.2.19.1
php7-bz2-debuginfo-7.2.5-lp150.2.19.1
php7-calendar-7.2.5-lp150.2.19.1
php7-calendar-debuginfo-7.2.5-lp150.2.19.1
php7-ctype-7.2.5-lp150.2.19.1
php7-ctype-debuginfo-7.2.5-lp150.2.19.1
php7-curl-7.2.5-lp150.2.19.1
php7-curl-debuginfo-7.2.5-lp150.2.19.1
php7-dba-7.2.5-lp150.2.19.1
php7-dba-debuginfo-7.2.5-lp150.2.19.1
php7-debuginfo-7.2.5-lp150.2.19.1
php7-debugsource-7.2.5-lp150.2.19.1
php7-devel-7.2.5-lp150.2.19.1
php7-dom-7.2.5-lp150.2.19.1
php7-dom-debuginfo-7.2.5-lp150.2.19.1
php7-embed-7.2.5-lp150.2.19.1
php7-embed-debuginfo-7.2.5-lp150.2.19.1
php7-enchant-7.2.5-lp150.2.19.1
php7-enchant-debuginfo-7.2.5-lp150.2.19.1
php7-exif-7.2.5-lp150.2.19.1
php7-exif-debuginfo-7.2.5-lp150.2.19.1
php7-fastcgi-7.2.5-lp150.2.19.1
php7-fastcgi-debuginfo-7.2.5-lp150.2.19.1
php7-fileinfo-7.2.5-lp150.2.19.1
php7-fileinfo-debuginfo-7.2.5-lp150.2.19.1
php7-firebird-7.2.5-lp150.2.19.1
php7-firebird-debuginfo-7.2.5-lp150.2.19.1
php7-fpm-7.2.5-lp150.2.19.1
php7-fpm-debuginfo-7.2.5-lp150.2.19.1
php7-ftp-7.2.5-lp150.2.19.1
php7-ftp-debuginfo-7.2.5-lp150.2.19.1
php7-gd-7.2.5-lp150.2.19.1
php7-gd-debuginfo-7.2.5-lp150.2.19.1
php7-gettext-7.2.5-lp150.2.19.1
php7-gettext-debuginfo-7.2.5-lp150.2.19.1
php7-gmp-7.2.5-lp150.2.19.1
php7-gmp-debuginfo-7.2.5-lp150.2.19.1
php7-iconv-7.2.5-lp150.2.19.1
php7-iconv-debuginfo-7.2.5-lp150.2.19.1
php7-intl-7.2.5-lp150.2.19.1
php7-intl-debuginfo-7.2.5-lp150.2.19.1
php7-json-7.2.5-lp150.2.19.1
php7-json-debuginfo-7.2.5-lp150.2.19.1
php7-ldap-7.2.5-lp150.2.19.1
php7-ldap-debuginfo-7.2.5-lp150.2.19.1
php7-mbstring-7.2.5-lp150.2.19.1
php7-mbstring-debuginfo-7.2.5-lp150.2.19.1
php7-mysql-7.2.5-lp150.2.19.1
php7-mysql-debuginfo-7.2.5-lp150.2.19.1
php7-odbc-7.2.5-lp150.2.19.1
php7-odbc-debuginfo-7.2.5-lp150.2.19.1
php7-opcache-7.2.5-lp150.2.19.1
php7-opcache-debuginfo-7.2.5-lp150.2.19.1
php7-openssl-7.2.5-lp150.2.19.1
php7-openssl-debuginfo-7.2.5-lp150.2.19.1
php7-pcntl-7.2.5-lp150.2.19.1
php7-pcntl-debuginfo-7.2.5-lp150.2.19.1
php7-pdo-7.2.5-lp150.2.19.1
php7-pdo-debuginfo-7.2.5-lp150.2.19.1
php7-pgsql-7.2.5-lp150.2.19.1
php7-pgsql-debuginfo-7.2.5-lp150.2.19.1
php7-phar-7.2.5-lp150.2.19.1
php7-phar-debuginfo-7.2.5-lp150.2.19.1
php7-posix-7.2.5-lp150.2.19.1
php7-posix-debuginfo-7.2.5-lp150.2.19.1
php7-readline-7.2.5-lp150.2.19.1
php7-readline-debuginfo-7.2.5-lp150.2.19.1
php7-shmop-7.2.5-lp150.2.19.1
php7-shmop-debuginfo-7.2.5-lp150.2.19.1
php7-snmp-7.2.5-lp150.2.19.1
php7-snmp-debuginfo-7.2.5-lp150.2.19.1
php7-soap-7.2.5-lp150.2.19.1
php7-soap-debuginfo-7.2.5-lp150.2.19.1
php7-sockets-7.2.5-lp150.2.19.1
php7-sockets-debuginfo-7.2.5-lp150.2.19.1
php7-sodium-7.2.5-lp150.2.19.1
php7-sodium-debuginfo-7.2.5-lp150.2.19.1
php7-sqlite-7.2.5-lp150.2.19.1
php7-sqlite-debuginfo-7.2.5-lp150.2.19.1
php7-sysvmsg-7.2.5-lp150.2.19.1
php7-sysvmsg-debuginfo-7.2.5-lp150.2.19.1
php7-sysvsem-7.2.5-lp150.2.19.1
php7-sysvsem-debuginfo-7.2.5-lp150.2.19.1
php7-sysvshm-7.2.5-lp150.2.19.1
php7-sysvshm-debuginfo-7.2.5-lp150.2.19.1
php7-testresults-7.2.5-lp150.2.19.1
php7-tidy-7.2.5-lp150.2.19.1
php7-tidy-debuginfo-7.2.5-lp150.2.19.1
php7-tokenizer-7.2.5-lp150.2.19.1
php7-tokenizer-debuginfo-7.2.5-lp150.2.19.1
php7-wddx-7.2.5-lp150.2.19.1
php7-wddx-debuginfo-7.2.5-lp150.2.19.1
php7-xmlreader-7.2.5-lp150.2.19.1
php7-xmlreader-debuginfo-7.2.5-lp150.2.19.1
php7-xmlrpc-7.2.5-lp150.2.19.1
php7-xmlrpc-debuginfo-7.2.5-lp150.2.19.1
php7-xmlwriter-7.2.5-lp150.2.19.1
php7-xmlwriter-debuginfo-7.2.5-lp150.2.19.1
php7-xsl-7.2.5-lp150.2.19.1
php7-xsl-debuginfo-7.2.5-lp150.2.19.1
php7-zip-7.2.5-lp150.2.19.1
php7-zip-debuginfo-7.2.5-lp150.2.19.1
php7-zlib-7.2.5-lp150.2.19.1
php7-zlib-debuginfo-7.2.5-lp150.2.19.1
- openSUSE Leap 15.0 (noarch):
php7-pear-7.2.5-lp150.2.19.1
php7-pear-Archive_Tar-7.2.5-lp150.2.19.1
References:
https://www.suse.com/security/cve/CVE-2018-19935.html
https://www.suse.com/security/cve/CVE-2018-20783.html
https://www.suse.com/security/cve/CVE-2019-11034.html
https://www.suse.com/security/cve/CVE-2019-11035.html
https://www.suse.com/security/cve/CVE-2019-11036.html
https://www.suse.com/security/cve/CVE-2019-9020.html
https://www.suse.com/security/cve/CVE-2019-9021.html
https://www.suse.com/security/cve/CVE-2019-9022.html
https://www.suse.com/security/cve/CVE-2019-9023.html
https://www.suse.com/security/cve/CVE-2019-9024.html
https://www.suse.com/security/cve/CVE-2019-9637.html
https://www.suse.com/security/cve/CVE-2019-9638.html
https://www.suse.com/security/cve/CVE-2019-9639.html
https://www.suse.com/security/cve/CVE-2019-9640.html
https://www.suse.com/security/cve/CVE-2019-9641.html
https://www.suse.com/security/cve/CVE-2019-9675.html
https://bugzilla.suse.com/1118832
https://bugzilla.suse.com/1119396
https://bugzilla.suse.com/1126711
https://bugzilla.suse.com/1126713
https://bugzilla.suse.com/1126821
https://bugzilla.suse.com/1126823
https://bugzilla.suse.com/1126827
https://bugzilla.suse.com/1127122
https://bugzilla.suse.com/1128722
https://bugzilla.suse.com/1128883
https://bugzilla.suse.com/1128886
https://bugzilla.suse.com/1128887
https://bugzilla.suse.com/1128889
https://bugzilla.suse.com/1128892
https://bugzilla.suse.com/1129032
https://bugzilla.suse.com/1132837
https://bugzilla.suse.com/1132838
https://bugzilla.suse.com/1134322
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2019:1575-1: moderate: Security update for libcroco
by opensuse-security@opensuse.org 18 Jun '19
by opensuse-security@opensuse.org 18 Jun '19
18 Jun '19
openSUSE Security Update: Security update for libcroco
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1575-1
Rating: moderate
References: #1034481 #1034482 #1043898 #1043899
Cross-References: CVE-2017-7960 CVE-2017-7961 CVE-2017-8834
CVE-2017-8871
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for libcroco fixes the following issues:
Security issues fixed:
- CVE-2017-7960: Fixed heap overflow (input: check end of input before
reading a byte) (bsc#1034481).
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long
rgb values) (bsc#1034482).
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a
crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU
consumption) via a crafted CSS file (bsc#1043899).
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1575=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
libcroco-0.6.11-5.3.1
libcroco-0_6-3-0.6.11-5.3.1
libcroco-0_6-3-debuginfo-0.6.11-5.3.1
libcroco-debuginfo-0.6.11-5.3.1
libcroco-debugsource-0.6.11-5.3.1
libcroco-devel-0.6.11-5.3.1
- openSUSE Leap 42.3 (x86_64):
libcroco-0_6-3-32bit-0.6.11-5.3.1
libcroco-0_6-3-debuginfo-32bit-0.6.11-5.3.1
References:
https://www.suse.com/security/cve/CVE-2017-7960.html
https://www.suse.com/security/cve/CVE-2017-7961.html
https://www.suse.com/security/cve/CVE-2017-8834.html
https://www.suse.com/security/cve/CVE-2017-8871.html
https://bugzilla.suse.com/1034481
https://bugzilla.suse.com/1034482
https://bugzilla.suse.com/1043898
https://bugzilla.suse.com/1043899
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0