AusCERT - Security Bulletins

Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 1 óra 34 perc
ESB-2021.0205 - [SUSE] ImageMagick: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0205
Security update for ImageMagick
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: ImageMagick
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Existing Account
Denial of Service -- Existing Account
Reduced Security -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2020-29599 CVE-2020-27776 CVE-2020-27775
CVE-2020-27774 CVE-2020-27773 CVE-2020-27772
CVE-2020-27771 CVE-2020-27770 CVE-2020-27769
CVE-2020-27768 CVE-2020-27767 CVE-2020-27766
CVE-2020-27765 CVE-2020-27764 CVE-2020-27763
CVE-2020-27762 CVE-2020-27761 CVE-2020-27760
CVE-2020-27759 CVE-2020-27758 CVE-2020-27757
CVE-2020-27756 CVE-2020-27755 CVE-2020-27754
CVE-2020-27753 CVE-2020-27752 CVE-2020-27751
CVE-2020-27750 CVE-2020-25676 CVE-2020-25675
CVE-2020-25674 CVE-2020-25666 CVE-2020-25665
CVE-2020-25664 CVE-2020-19667
Reference: ESB-2021.0165
ESB-2021.0110
ESB-2021.0038
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210153-1
Comment: This bulletin contains two (2) SUSE security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:14598-1
Rating: moderate
References: #1179103 #1179202 #1179212 #1179269 #1179281 #1179311
#1179312 #1179313 #1179315 #1179321 #1179322 #1179327
#1179336 #1179338 #1179339 #1179345 #1179346 #1179347
#1179397
Cross-References: CVE-2020-19667 CVE-2020-25664 CVE-2020-25666 CVE-2020-27751
CVE-2020-27752 CVE-2020-27753 CVE-2020-27754 CVE-2020-27755
CVE-2020-27759 CVE-2020-27760 CVE-2020-27761 CVE-2020-27763
CVE-2020-27765 CVE-2020-27767 CVE-2020-27768 CVE-2020-27769
CVE-2020-27771 CVE-2020-27772 CVE-2020-27775
Affected Products:
SUSE Linux Enterprise Server 11-SP4-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes 19 vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
o CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in
a crash (bsc#1179103).
o CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#
1179202).
o CVE-2020-25666: Fixed an outside the range of representable values of type
'int' and signed integer overflow (bsc#1179212).
o CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c
(bsc#1179269).
o CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in
MagickCore/quantum-private.h (bsc#1179346).
o CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#
1179397).
o CVE-2020-27754: Fixed an outside the range of representable values of type
'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
o CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in
ImageMagick/MagickCore/memory.c (bsc#1179345).
o CVE-2020-27757: Fixed an outside the range of representable values of type
'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
o CVE-2020-27759: Fixed an outside the range of representable values of type
'int' at MagickCore/quantize.c (bsc#1179313).
o CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#
1179281).
o CVE-2020-27761: Fixed an outside the range of representable values of type
'unsigned long' at coders/palm.c (bsc#1179315).
o CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#
1179312).
o CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#
1179311).
o CVE-2020-27767: Fixed an outside the range of representable values of type
'float' at MagickCore/quantum.h (bsc#1179322).
o CVE-2020-27768: Fixed an outside the range of representable values of type
'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
o CVE-2020-27769: Fixed an outside the range of representable values of type
'float' at MagickCore/quantize.c (bsc#1179321).
o CVE-2020-27771: Fixed an outside the range of representable values of type
'unsigned char' at coders/pdf.c (bsc#1179327).
o CVE-2020-27772: Fixed an outside the range of representable values of type
'unsigned int' at coders/bmp.c (bsc#1179347).
o CVE-2020-27775: Fixed an outside the range of representable values of type
'unsigned char' at MagickCore/quantum.h (bsc#1179338).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Server 11-SP4-LTSS:
zypper in -t patch slessp4-ImageMagick-14598=1
o SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-ImageMagick-14598=1
o SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-ImageMagick-14598=1
o SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-ImageMagick-14598=1
Package List:
o SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):
libMagickCore1-6.4.3.6-78.135.1
o SUSE Linux Enterprise Server 11-SP4-LTSS (ppc64 s390x x86_64):
libMagickCore1-32bit-6.4.3.6-78.135.1
o SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
libMagickCore1-6.4.3.6-78.135.1
o SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64):
ImageMagick-debuginfo-6.4.3.6-78.135.1
ImageMagick-debugsource-6.4.3.6-78.135.1
o SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
ImageMagick-debuginfo-6.4.3.6-78.135.1
ImageMagick-debugsource-6.4.3.6-78.135.1
References:
o https://www.suse.com/security/cve/CVE-2020-19667.html
o https://www.suse.com/security/cve/CVE-2020-25664.html
o https://www.suse.com/security/cve/CVE-2020-25666.html
o https://www.suse.com/security/cve/CVE-2020-27751.html
o https://www.suse.com/security/cve/CVE-2020-27752.html
o https://www.suse.com/security/cve/CVE-2020-27753.html
o https://www.suse.com/security/cve/CVE-2020-27754.html
o https://www.suse.com/security/cve/CVE-2020-27755.html
o https://www.suse.com/security/cve/CVE-2020-27759.html
o https://www.suse.com/security/cve/CVE-2020-27760.html
o https://www.suse.com/security/cve/CVE-2020-27761.html
o https://www.suse.com/security/cve/CVE-2020-27763.html
o https://www.suse.com/security/cve/CVE-2020-27765.html
o https://www.suse.com/security/cve/CVE-2020-27767.html
o https://www.suse.com/security/cve/CVE-2020-27768.html
o https://www.suse.com/security/cve/CVE-2020-27769.html
o https://www.suse.com/security/cve/CVE-2020-27771.html
o https://www.suse.com/security/cve/CVE-2020-27772.html
o https://www.suse.com/security/cve/CVE-2020-27775.html
o https://bugzilla.suse.com/1179103
o https://bugzilla.suse.com/1179202
o https://bugzilla.suse.com/1179212
o https://bugzilla.suse.com/1179269
o https://bugzilla.suse.com/1179281
o https://bugzilla.suse.com/1179311
o https://bugzilla.suse.com/1179312
o https://bugzilla.suse.com/1179313
o https://bugzilla.suse.com/1179315
o https://bugzilla.suse.com/1179321
o https://bugzilla.suse.com/1179322
o https://bugzilla.suse.com/1179327
o https://bugzilla.suse.com/1179336
o https://bugzilla.suse.com/1179338
o https://bugzilla.suse.com/1179339
o https://bugzilla.suse.com/1179345
o https://bugzilla.suse.com/1179346
o https://bugzilla.suse.com/1179347
o https://bugzilla.suse.com/1179397
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0153-1
Rating: moderate
References: #1179202 #1179208 #1179212 #1179221 #1179223 #1179240
#1179244 #1179260 #1179268 #1179269 #1179276 #1179278
#1179281 #1179285 #1179311 #1179312 #1179313 #1179315
#1179317 #1179321 #1179322 #1179327 #1179333 #1179336
#1179338 #1179339 #1179343 #1179345 #1179346 #1179347
#1179361 #1179362 #1179397 #1179753
Cross-References: CVE-2020-25664 CVE-2020-25665 CVE-2020-25666 CVE-2020-25674
CVE-2020-25675 CVE-2020-25676 CVE-2020-27750 CVE-2020-27751
CVE-2020-27752 CVE-2020-27753 CVE-2020-27754 CVE-2020-27755
CVE-2020-27756 CVE-2020-27757 CVE-2020-27758 CVE-2020-27759
CVE-2020-27760 CVE-2020-27761 CVE-2020-27762 CVE-2020-27763
CVE-2020-27764 CVE-2020-27765 CVE-2020-27766 CVE-2020-27767
CVE-2020-27768 CVE-2020-27769 CVE-2020-27770 CVE-2020-27771
CVE-2020-27772 CVE-2020-27773 CVE-2020-27774 CVE-2020-27775
CVE-2020-27776 CVE-2020-29599
Affected Products:
SUSE Linux Enterprise Module for Development Tools 15-SP2
SUSE Linux Enterprise Module for Desktop Applications 15-SP2
______________________________________________________________________________
An update that fixes 34 vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
o CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#
1179202).
o CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#
1179208).
o CVE-2020-25666: Fixed an outside the range of representable values of type
'int' and signed integer overflow (bsc#1179212).
o CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc
#1179223).
o CVE-2020-25675: Fixed an outside the range of representable values of type
'long' and integer overflow (bsc#1179240).
o CVE-2020-25676: Fixed an outside the range of representable values of type
'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
o CVE-2020-27750: Fixed a division by zero in MagickCore/colorspace-private.h
(bsc#1179260).
o CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c
(bsc#1179269).
o CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in
MagickCore/quantum-private.h (bsc#1179346).
o CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in
MagickCore/quantum-private.h (bsc#1179346).
o CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#
1179397).
o CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in
ImageMagick/MagickCore/memory.c (bsc#1179345).
o CVE-2020-27756: Fixed a division by zero at MagickCore/geometry.c (bsc#
1179221).
o CVE-2020-27757: Fixed an outside the range of representable values of type
'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
o CVE-2020-27758: Fixed an outside the range of representable values of type
'unsigned long long' (bsc#1179276).
o CVE-2020-27759: Fixed an outside the range of representable values of type
'int' at MagickCore/quantize.c (bsc#1179313).
o CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#
1179281).
o CVE-2020-27761: Fixed an outside the range of representable values of type
'unsigned long' at coders/palm.c (bsc#1179315).
o CVE-2020-27762: Fixed an outside the range of representable values of type
'unsigned char' (bsc#1179278).
o CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#
1179312).
o CVE-2020-27764: Fixed an outside the range of representable values of type
'unsigned long' at MagickCore/statistic.c (bsc#1179317).
o CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#
1179311).
o CVE-2020-27766: Fixed an outside the range of representable values of type
'unsigned long' at MagickCore/statistic.c (bsc#1179361).
o CVE-2020-27767: Fixed an outside the range of representable values of type
'float' at MagickCore/quantum.h (bsc#1179322).
o CVE-2020-27768: Fixed an outside the range of representable values of type
'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
o CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c
(bsc#1179343).
o CVE-2020-27771: Fixed an outside the range of representable values of type
'unsigned char' at coders/pdf.c (bsc#1179327).
o CVE-2020-27772: Fixed an outside the range of representable values of type
'unsigned int' at coders/bmp.c (bsc#1179347).
o CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#
1179285).
o CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#
1179333).
o CVE-2020-27775: Fixed an outside the range of representable values of type
'unsigned char' at MagickCore/quantum.h (bsc#1179338).
o CVE-2020-27776: Fixed an outside the range of representable values of type
'unsigned long' at MagickCore/statistic.c (bsc#1179362).
o CVE-2020-29599: Fixed a shell command injection in -authenticate (bsc#
1179753).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for Development Tools 15-SP2:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-153=1
o SUSE Linux Enterprise Module for Desktop Applications 15-SP2:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-153=1
Package List:
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le
s390x x86_64):
ImageMagick-debuginfo-7.0.7.34-10.9.1
ImageMagick-debugsource-7.0.7.34-10.9.1
perl-PerlMagick-7.0.7.34-10.9.1
perl-PerlMagick-debuginfo-7.0.7.34-10.9.1
o SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (aarch64
ppc64le s390x x86_64):
ImageMagick-7.0.7.34-10.9.1
ImageMagick-config-7-SUSE-7.0.7.34-10.9.1
ImageMagick-config-7-upstream-7.0.7.34-10.9.1
ImageMagick-debuginfo-7.0.7.34-10.9.1
ImageMagick-debugsource-7.0.7.34-10.9.1
ImageMagick-devel-7.0.7.34-10.9.1
libMagick++-7_Q16HDRI4-7.0.7.34-10.9.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-10.9.1
libMagick++-devel-7.0.7.34-10.9.1
libMagickCore-7_Q16HDRI6-7.0.7.34-10.9.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-10.9.1
libMagickWand-7_Q16HDRI6-7.0.7.34-10.9.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-10.9.1
References:
o https://www.suse.com/security/cve/CVE-2020-25664.html
o https://www.suse.com/security/cve/CVE-2020-25665.html
o https://www.suse.com/security/cve/CVE-2020-25666.html
o https://www.suse.com/security/cve/CVE-2020-25674.html
o https://www.suse.com/security/cve/CVE-2020-25675.html
o https://www.suse.com/security/cve/CVE-2020-25676.html
o https://www.suse.com/security/cve/CVE-2020-27750.html
o https://www.suse.com/security/cve/CVE-2020-27751.html
o https://www.suse.com/security/cve/CVE-2020-27752.html
o https://www.suse.com/security/cve/CVE-2020-27753.html
o https://www.suse.com/security/cve/CVE-2020-27754.html
o https://www.suse.com/security/cve/CVE-2020-27755.html
o https://www.suse.com/security/cve/CVE-2020-27756.html
o https://www.suse.com/security/cve/CVE-2020-27757.html
o https://www.suse.com/security/cve/CVE-2020-27758.html
o https://www.suse.com/security/cve/CVE-2020-27759.html
o https://www.suse.com/security/cve/CVE-2020-27760.html
o https://www.suse.com/security/cve/CVE-2020-27761.html
o https://www.suse.com/security/cve/CVE-2020-27762.html
o https://www.suse.com/security/cve/CVE-2020-27763.html
o https://www.suse.com/security/cve/CVE-2020-27764.html
o https://www.suse.com/security/cve/CVE-2020-27765.html
o https://www.suse.com/security/cve/CVE-2020-27766.html
o https://www.suse.com/security/cve/CVE-2020-27767.html
o https://www.suse.com/security/cve/CVE-2020-27768.html
o https://www.suse.com/security/cve/CVE-2020-27769.html
o https://www.suse.com/security/cve/CVE-2020-27770.html
o https://www.suse.com/security/cve/CVE-2020-27771.html
o https://www.suse.com/security/cve/CVE-2020-27772.html
o https://www.suse.com/security/cve/CVE-2020-27773.html
o https://www.suse.com/security/cve/CVE-2020-27774.html
o https://www.suse.com/security/cve/CVE-2020-27775.html
o https://www.suse.com/security/cve/CVE-2020-27776.html
o https://www.suse.com/security/cve/CVE-2020-29599.html
o https://bugzilla.suse.com/1179202
o https://bugzilla.suse.com/1179208
o https://bugzilla.suse.com/1179212
o https://bugzilla.suse.com/1179221
o https://bugzilla.suse.com/1179223
o https://bugzilla.suse.com/1179240
o https://bugzilla.suse.com/1179244
o https://bugzilla.suse.com/1179260
o https://bugzilla.suse.com/1179268
o https://bugzilla.suse.com/1179269
o https://bugzilla.suse.com/1179276
o https://bugzilla.suse.com/1179278
o https://bugzilla.suse.com/1179281
o https://bugzilla.suse.com/1179285
o https://bugzilla.suse.com/1179311
o https://bugzilla.suse.com/1179312
o https://bugzilla.suse.com/1179313
o https://bugzilla.suse.com/1179315
o https://bugzilla.suse.com/1179317
o https://bugzilla.suse.com/1179321
o https://bugzilla.suse.com/1179322
o https://bugzilla.suse.com/1179327
o https://bugzilla.suse.com/1179333
o https://bugzilla.suse.com/1179336
o https://bugzilla.suse.com/1179338
o https://bugzilla.suse.com/1179339
o https://bugzilla.suse.com/1179343
o https://bugzilla.suse.com/1179345
o https://bugzilla.suse.com/1179346
o https://bugzilla.suse.com/1179347
o https://bugzilla.suse.com/1179361
o https://bugzilla.suse.com/1179362
o https://bugzilla.suse.com/1179397
o https://bugzilla.suse.com/1179753
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=emS7
-----END PGP SIGNATURE-----
ESB-2021.0204 - [SUSE] tcmu-runner: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0204
Security update for tcmu-runner
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: tcmu-runner
Publisher: SUSE
Operating System: SUSE
Impact/Access: Provide Misleading Information -- Existing Account
Reduced Security -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-3139 CVE-2020-28374
Reference: ESB-2021.0189
ESB-2021.0187
ESB-2021.0161
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210143-1
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for tcmu-runner
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0143-1
Rating: important
References: #1138443 #1180676
Cross-References: CVE-2021-3139
Affected Products:
SUSE Enterprise Storage 6
______________________________________________________________________________
An update that solves one vulnerability and has one errata is now available.
Description:
This update for tcmu-runner fixes the following issue:
o CVE-2021-3139: Fixed a LIO security issue (bsc#1180676).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2021-143=1
Package List:
o SUSE Enterprise Storage 6 (aarch64 x86_64):
libtcmu2-1.4.0-4.3.1
libtcmu2-debuginfo-1.4.0-4.3.1
tcmu-runner-1.4.0-4.3.1
tcmu-runner-debuginfo-1.4.0-4.3.1
tcmu-runner-debugsource-1.4.0-4.3.1
tcmu-runner-handler-rbd-1.4.0-4.3.1
tcmu-runner-handler-rbd-debuginfo-1.4.0-4.3.1
References:
o https://www.suse.com/security/cve/CVE-2021-3139.html
o https://bugzilla.suse.com/1138443
o https://bugzilla.suse.com/1180676
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=cFyT
-----END PGP SIGNATURE-----
ESB-2021.0202 - [SUSE] slurm_20_02: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0202
Security update for slurm_20_02
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: slurm_20_02
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Access Confidential Data -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-27746 CVE-2020-27745
Reference: ESB-2020.4537
ESB-2020.4501
ESB-2020.4484
ESB-2020.4176
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210139-1
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for slurm_20_02
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0139-1
Rating: moderate
References: #1178890 #1178891
Cross-References: CVE-2020-27745 CVE-2020-27746
Affected Products:
SUSE Linux Enterprise Module for HPC 15-SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for slurm_20_02 fixes the following issues:
Updated to 20.02.6, addresses two security fixes:
* PMIx - fix potential buffer overflows from use of unpackmem(). CVE-2020-27745
(bsc#1178890) * X11 forwarding - fix potential leak of the magic cookie when
sent as an argument to the xauth command. CVE-2020-27746 (bsc#1178891)
And many other bugfixes, full log and details available at: * https://
lists.schedmd.com/pipermail/slurm-announce/2020/000045.html
Updated to 20.02.5, changes:
* Fix leak of TRESRunMins when job time is changed with --time-min * pam_slurm
- - explicitly initialize slurm config to support configless mode. * scontrol -
Fix exit code when creating/updating reservations with wrong Flags. * When a
GRES has a no_consume flag, report 0 for allocated. * Fix cgroup cleanup by
jobacct_gather/cgroup. * When creating reservations/jobs don't allow counts on
a feature unless using an XOR. * Improve number of boards discovery * Fix
updating a reservation NodeCnt on a zero-count reservation. * slurmrestd -
provide an explicit error messages when PSK auth fails. * cons_tres - fix job
requesting single gres per-node getting two or more nodes with less CPUs than
requested per-task. * cons_tres - fix calculation of cores when using gres and
cpus-per-task. * cons_tres - fix job not getting access to socket without GPU
or with less than --gpus-per-socket when not enough cpus available on required
socket and not using --gres-flags=enforce binding. * Fix HDF5 type version
build error. * Fix creation of CoreCnt only reservations when the first node
isn't available. * Fix wrong DBD Agent queue size in sdiag when using
accounting_storage/none. * Improve job constraints XOR option logic. * Fix
preemption of hetjobs when needed nodes not in leader component. * Fix wrong
bit_or() messing potential preemptor jobs node bitmap, causing bad node
deallocations and even allocation of nodes from other partitions. * Fix
double-deallocation of preempted non-leader hetjob components. * slurmdbd -
prevent truncation of the step nodelists over 4095. * Fix nodes remaining in
drain state state after rebooting with ASAP option.
changes from 20.02.4:
* srun - suppress job step creation warning message when waiting on
PrologSlurmctld. * slurmrestd - fix incorrect return values in
data_list_for_each() functions. * mpi/pmix - fix issue where HetJobs could fail
to launch. * slurmrestd - set content-type header in responses. * Fix cons_res
GRES overallocation for --gres-flags=disable-binding. * Fix cons_res
incorrectly filtering cores with respect to GRES locality for --gres-flags=
disable-binding requests. * Fix regression where a dependency on multiple jobs
in a single array using underscores would only add the first job. * slurmrestd
- - fix corrupted output due to incorrect use of memcpy(). * slurmrestd - address
a number of minor Coverity warnings. * Handle retry failure when slurmstepd is
communicating with srun correctly. * Fix jobacct_gather possibly duplicate
stats when _is_a_lwp error shows up. * Fix tasks binding to GRES which are
closest to the allocated CPUs. * Fix AMD GPU ROCM 3.5 support. * Fix handling
of job arrays in sacct when querying specific steps. * slurmrestd - avoid
fallback to local socket authentication if JWT authentication is ill-formed. *
slurmrestd - restrict ability of requests to use different authentication
plugins. * slurmrestd - unlink named unix sockets before closing. * slurmrestd
- - fix invalid formatting in openapi.json. * Fix batch jobs stuck in CF state on
FrontEnd mode. * Add a separate explicit error message when rejecting changes
to active node features. * cons_common/job_test - fix slurmctld SIGABRT due to
double-free. * Fix updating reservations to set the duration correctly if
updating the start time. * Fix update reservation to promiscuous mode. * Fix
override of job tasks count to max when ntasks-per-node present. * Fix min CPUs
per node not being at least CPUs per task requested. * Fix CPUs allocated to
match CPUs requested when requesting GRES and threads per core equal to one. *
Fix NodeName config parsing with Boards and without CPUs. * Ensure
SLURM_JOB_USER and SLURM_JOB_UID are set in SrunProlog/Epilog. * Fix error
messages for certain invalid salloc/sbatch/srun options. * pmi2 - clean up
sockets at step termination. * Fix 'scontrol hold' to work with 'JobName'. *
sbatch - handle --uid/--gid in #SBATCH directives properly. * Fix race
condition in job termination on slurmd. * Print specific error messages if
trying to run use certain priority/multifactor factors that cannot work without
SlurmDBD. * Avoid partial GRES allocation when --gpus-per-job is not satisfied.
* Cray - Avoid referencing a variable outside of it's correct scope when
dealing with creating steps within a het job. * slurmrestd - correctly handle
larger addresses from accept(). * Avoid freeing wrong pointer with
SlurmctldParameters=max_dbd_msg_action with another option after that. *
Restore MCS label when suspended job is resumed. * Fix insufficient lock
levels. * slurmrestd - use errno from job submission. * Fix "user" filter for
sacctmgr show transactions. * Fix preemption logic. * Fix no_consume GRES for
exclusive (whole node) requests. * Fix regression in 20.02 that caused an
infinite loop in slurmctld when requesting --distribution=plane for the job. *
Fix parsing of the --distribution option. * Add CONF READ_LOCK to
_handle_fed_send_job_sync. * prep/script - always call slurmctld PrEp callback
in _run_script(). * Fix node estimation for jobs that use GPUs or
- --cpus-per-task. * Fix jobcomp, job_submit and cli_filter Lua implementation
plugins causing slurmctld and/or job submission CLI tools segfaults due to bad
return handling when the respective Lua script failed to load. * Fix
propagation of gpu options through hetjob components. * Add SLURM_CLUSTERS
environment variable to scancel. * Fix packing/unpacking of "unlinked" jobs. *
Connect slurmstepd's stderr to srun for steps launched with --pty. * Handle MPS
correctly when doing exclusive allocations. * slurmrestd - fix compiling
against libhttpparser in a non-default path. * slurmrestd - avoid compilation
issues with libhttpparser < 2.6. * Fix compile issues when compiling slurmrestd
without --enable-debug. * Reset idle time on a reservation that is getting
purged. * Fix reoccurring reservations that have Purge_comp= to keep correct
duration if they are purged. * scontrol - changed the "PROMISCUOUS" flag to
"MAGNETIC" * Early return from epilog_set_env in case of no_consume. * Fix
cons_common/job_test start time discovery logic to prevent skewed results
between "will run test" executions. * Ensure TRESRunMins limits are maintained
during "scontrol reconfigure". * Improve error message when host lookup fails.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for HPC 15-SP1:
zypper in -t patch SUSE-SLE-Module-HPC-15-SP1-2021-139=1
Package List:
o SUSE Linux Enterprise Module for HPC 15-SP1 (aarch64 x86_64):
libnss_slurm2_20_02-20.02.6-3.16.1
libnss_slurm2_20_02-debuginfo-20.02.6-3.16.1
libpmi0_20_02-20.02.6-3.16.1
libpmi0_20_02-debuginfo-20.02.6-3.16.1
libslurm35-20.02.6-3.16.1
libslurm35-debuginfo-20.02.6-3.16.1
perl-slurm_20_02-20.02.6-3.16.1
perl-slurm_20_02-debuginfo-20.02.6-3.16.1
slurm_20_02-20.02.6-3.16.1
slurm_20_02-auth-none-20.02.6-3.16.1
slurm_20_02-auth-none-debuginfo-20.02.6-3.16.1
slurm_20_02-config-20.02.6-3.16.1
slurm_20_02-config-man-20.02.6-3.16.1
slurm_20_02-debuginfo-20.02.6-3.16.1
slurm_20_02-debugsource-20.02.6-3.16.1
slurm_20_02-devel-20.02.6-3.16.1
slurm_20_02-doc-20.02.6-3.16.1
slurm_20_02-lua-20.02.6-3.16.1
slurm_20_02-lua-debuginfo-20.02.6-3.16.1
slurm_20_02-munge-20.02.6-3.16.1
slurm_20_02-munge-debuginfo-20.02.6-3.16.1
slurm_20_02-node-20.02.6-3.16.1
slurm_20_02-node-debuginfo-20.02.6-3.16.1
slurm_20_02-pam_slurm-20.02.6-3.16.1
slurm_20_02-pam_slurm-debuginfo-20.02.6-3.16.1
slurm_20_02-plugins-20.02.6-3.16.1
slurm_20_02-plugins-debuginfo-20.02.6-3.16.1
slurm_20_02-slurmdbd-20.02.6-3.16.1
slurm_20_02-slurmdbd-debuginfo-20.02.6-3.16.1
slurm_20_02-sql-20.02.6-3.16.1
slurm_20_02-sql-debuginfo-20.02.6-3.16.1
slurm_20_02-sview-20.02.6-3.16.1
slurm_20_02-sview-debuginfo-20.02.6-3.16.1
slurm_20_02-torque-20.02.6-3.16.1
slurm_20_02-torque-debuginfo-20.02.6-3.16.1
slurm_20_02-webdoc-20.02.6-3.16.1
References:
o https://www.suse.com/security/cve/CVE-2020-27745.html
o https://www.suse.com/security/cve/CVE-2020-27746.html
o https://bugzilla.suse.com/1178890
o https://bugzilla.suse.com/1178891
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=pYju
-----END PGP SIGNATURE-----
ESB-2021.0201 - [SUSE] MozillaThunderbird: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0201
Security update for MozillaThunderbird
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: MozillaThunderbird
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2020-16044
Reference: ESB-2021.0158
ESB-2021.0128
ESB-2021.0093
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210122-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210123-1
Comment: This bulletin contains two (2) SUSE security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0122-1
Rating: important
References: #1180623
Cross-References: CVE-2020-16044
Affected Products:
SUSE Linux Enterprise Workstation Extension 15-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for MozillaThunderbird fixes the following issues:
o Mozilla Thunderbird 78.6.1 * changed: MailExtensions: browserAction,
composeAction, and messageDisplayAction toolbar buttons now support label
and default_label properties (bmo#1583478) * fixed: Running a quicksearch
that returned no results did not offer to re-run as a global search (bmo#
1663153) * fixed: Message search toolbar fixes (bmo#1681010) * fixed: Very
long subject lines distorted the message compose and display windows,
making them unusable (bmo#77806) * fixed: Compose window: Recipient
addresses that had not yet been autocompleted were lost when clicking Send
button (bmo#1674054) * fixed: Compose window: New message is no longer
marked as "changed" just from tabbing out of the recipient field without
editing anything (bmo#1681389) * fixed: Account autodiscover fixes when
using MS Exchange servers (bmo#1679759) * fixed: LDAP address book
stability fix (bmo#1680914) * fixed: Messages with invalid vcard
attachments were not marked as read when viewed in the preview window (bmo#
1680468) * fixed: Chat: Could not add TLS certificate exceptions for XMPP
connections (bmo#1590471) * fixed: Calendar: System timezone was not always
properly detected (bmo#1678839) * fixed: Calendar: Descriptions were
sometimes blank when editing a single occurrence of a repeating event (bmo#
1664731) * fixed: Various printing bugfixes (bmo#1676166) * fixed: Visual
consistency and theme improvements (bmo#1682808) MFSA 2021-02 (bsc#1180623)
* CVE-2020-16044 (bmo#1683964) Use-after-free write when handling a
malicious COOKIE-ECHO SCTP chunk
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Workstation Extension 15-SP1:
zypper in -t patch SUSE-SLE-Product-WE-15-SP1-2021-122=1
Package List:
o SUSE Linux Enterprise Workstation Extension 15-SP1 (x86_64):
MozillaThunderbird-78.6.1-3.116.1
MozillaThunderbird-debuginfo-78.6.1-3.116.1
MozillaThunderbird-debugsource-78.6.1-3.116.1
MozillaThunderbird-translations-common-78.6.1-3.116.1
MozillaThunderbird-translations-other-78.6.1-3.116.1
References:
o https://www.suse.com/security/cve/CVE-2020-16044.html
o https://bugzilla.suse.com/1180623
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0123-1
Rating: important
References: #1180623
Cross-References: CVE-2020-16044
Affected Products:
SUSE Linux Enterprise Workstation Extension 15-SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for MozillaThunderbird fixes the following issues:
o Mozilla Thunderbird 78.6.1 * changed: MailExtensions: browserAction,
composeAction, and messageDisplayAction toolbar buttons now support label
and default_label properties (bmo#1583478) * fixed: Running a quicksearch
that returned no results did not offer to re-run as a global search (bmo#
1663153) * fixed: Message search toolbar fixes (bmo#1681010) * fixed: Very
long subject lines distorted the message compose and display windows,
making them unusable (bmo#77806) * fixed: Compose window: Recipient
addresses that had not yet been autocompleted were lost when clicking Send
button (bmo#1674054) * fixed: Compose window: New message is no longer
marked as "changed" just from tabbing out of the recipient field without
editing anything (bmo#1681389) * fixed: Account autodiscover fixes when
using MS Exchange servers (bmo#1679759) * fixed: LDAP address book
stability fix (bmo#1680914) * fixed: Messages with invalid vcard
attachments were not marked as read when viewed in the preview window (bmo#
1680468) * fixed: Chat: Could not add TLS certificate exceptions for XMPP
connections (bmo#1590471) * fixed: Calendar: System timezone was not always
properly detected (bmo#1678839) * fixed: Calendar: Descriptions were
sometimes blank when editing a single occurrence of a repeating event (bmo#
1664731) * fixed: Various printing bugfixes (bmo#1676166) * fixed: Visual
consistency and theme improvements (bmo#1682808) MFSA 2021-02 (bsc#1180623)
* CVE-2020-16044 (bmo#1683964) Use-after-free write when handling a
malicious COOKIE-ECHO SCTP chunk
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Workstation Extension 15-SP2:
zypper in -t patch SUSE-SLE-Product-WE-15-SP2-2021-123=1
Package List:
o SUSE Linux Enterprise Workstation Extension 15-SP2 (x86_64):
MozillaThunderbird-78.6.1-8.6.1
MozillaThunderbird-debuginfo-78.6.1-8.6.1
MozillaThunderbird-debugsource-78.6.1-8.6.1
MozillaThunderbird-translations-common-78.6.1-8.6.1
MozillaThunderbird-translations-other-78.6.1-8.6.1
References:
o https://www.suse.com/security/cve/CVE-2020-16044.html
o https://bugzilla.suse.com/1180623
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=4rUM
-----END PGP SIGNATURE-----
ESB-2021.0200 - [SUSE] open-iscsi: Reduced security - Unknown/unspecified
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0200
Security update for open-iscsi
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: open-iscsi
Publisher: SUSE
Operating System: SUSE
Impact/Access: Reduced Security -- Unknown/Unspecified
Resolution: Patch/Upgrade
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210127-1
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for open-iscsi
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0127-1
Rating: important
References: #1179440 #1179908
Affected Products:
SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for open-iscsi fixes the following issues:
o Updated to upstream version 2.1.3 as 2.1.3-suse, for bsc#1179908,
including:
* uip: check for TCP urgent pointer past end of frame * uip: check for u8
overflow when processing TCP options * uip: check for header length
underflow during checksum calculation * fwparam_ppc: Fix memory leak in
fwparam_ppc.c * iscsiuio: Remove unused macro IFNAMSIZ defined in
iscsid_ipc.c * fwparam_ppc: Fix illegal memory access in fwparam_ppc.c *
sysfs: Verify parameter of sysfs_device_get() * fwparam_ppc: Fix NULL
pointer dereference in find_devtree() * open-iscsi: Clean user_param list
when process exit * iscsi_net_util: Fix NULL pointer dereference in
find_vlan_dev() * open-iscsi: Fix NULL pointer dereference in
mgmt_ipc_read_req() * open-iscsi: Fix invalid pointer deference in
find_initiator() * iscsiuio: Fix invalid parameter when call fstat() *
iscsi-iname: Verify open() return value before calling read() *
iscsi_sysfs: Fix NULL pointer deference in iscsi_sysfs_read_iface
o Updatged to latest upstream, including: * iscsiadm: Optimize the the
verification of mode paramters * iscsid: Poll timeout value to 1 minute for
iscsid * iscsiadm: fix host stats mode coredump * iscsid: fix logging level
when starting and shutting down daemon * Updated iscsiadm man page. * Fix
memory leak in sysfs_get_str * libopeniscsiusr: Compare with max int
instead of max long
o Systemd unit files should not depend on network.target (bsc#1179440).
o Updated to latest upstream, including async login ability: * Implement
login "no_wait" for iscsiadm NODE mode * iscsiadm buffer overflow
regression when discovering many targets at once * iscsid: Check Invalid
Session id for stop connection * Add ability to attempt target logins
asynchronously
o %service_del_postun_without_restart is now available on SLE More accurately
it's been introduced in SLE12-SP2+ and SLE15+
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-127=1
Package List:
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
x86_64):
iscsiuio-0.7.8.6-22.6.1
iscsiuio-debuginfo-0.7.8.6-22.6.1
libopeniscsiusr0_2_0-2.1.3-22.6.1
libopeniscsiusr0_2_0-debuginfo-2.1.3-22.6.1
open-iscsi-2.1.3-22.6.1
open-iscsi-debuginfo-2.1.3-22.6.1
open-iscsi-debugsource-2.1.3-22.6.1
open-iscsi-devel-2.1.3-22.6.1
References:
o https://bugzilla.suse.com/1179440
o https://bugzilla.suse.com/1179908
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=DJwW
-----END PGP SIGNATURE-----
ESB-2021.0199 - [SUSE] nodejs8: Execute arbitrary code/commands - Remote/unauthenticated
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0199
Security update for nodejs8
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: nodejs8
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Reduced Security -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-8287
Reference: ESB-2021.0160
ESB-2021.0159
ESB-2021.0112
ESB-2021.0111
ESB-2021.0063
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210121-1
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for nodejs8
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0121-1
Rating: moderate
References: #1180554
Cross-References: CVE-2020-8287
Affected Products:
SUSE Linux Enterprise Module for Web Scripting 15-SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for nodejs8 fixes the following issue:
o CVE-2020-8287: Fixed an HTTP request smuggling vulnerability (bsc#1180554).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for Web Scripting 15-SP2:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP2-2021-121=1
Package List:
o SUSE Linux Enterprise Module for Web Scripting 15-SP2 (aarch64 ppc64le
s390x x86_64):
nodejs8-8.17.0-10.6.1
nodejs8-debuginfo-8.17.0-10.6.1
nodejs8-debugsource-8.17.0-10.6.1
nodejs8-devel-8.17.0-10.6.1
npm8-8.17.0-10.6.1
o SUSE Linux Enterprise Module for Web Scripting 15-SP2 (noarch):
nodejs8-docs-8.17.0-10.6.1
References:
o https://www.suse.com/security/cve/CVE-2020-8287.html
o https://bugzilla.suse.com/1180554
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=BN9m
-----END PGP SIGNATURE-----
ESB-2021.0197 - [Linux][SUSE] php 7, php72, php64: Reduced security - Remote/unauthenticated
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0197
Security update for php7, php72, php74
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: php7
php72
php74
Publisher: SUSE
Operating System: SUSE
Linux variants
Impact/Access: Reduced Security -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-7071
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210124-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210125-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210126-1
Comment: This bulletin contains three (3) SUSE security advisories.
This advisory references vulnerabilities in products which run on
platforms other than SUSE. It is recommended that administrators
running php7, php72, php74 check for an updated version of the
software for their operating system.
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for php7
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0124-1
Rating: moderate
References: #1180706
Cross-References: CVE-2020-7071
Affected Products:
SUSE Linux Enterprise Module for Web Scripting 15-SP2
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for php7 fixes the following issue:
o CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted
URLs with invalid userinfo (bsc#1180706).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for Web Scripting 15-SP2:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP2-2021-124=1
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-124=1
Package List:
o SUSE Linux Enterprise Module for Web Scripting 15-SP2 (aarch64 ppc64le
s390x x86_64):
apache2-mod_php7-7.4.6-3.14.2
apache2-mod_php7-debuginfo-7.4.6-3.14.2
php7-7.4.6-3.14.2
php7-bcmath-7.4.6-3.14.2
php7-bcmath-debuginfo-7.4.6-3.14.2
php7-bz2-7.4.6-3.14.2
php7-bz2-debuginfo-7.4.6-3.14.2
php7-calendar-7.4.6-3.14.2
php7-calendar-debuginfo-7.4.6-3.14.2
php7-ctype-7.4.6-3.14.2
php7-ctype-debuginfo-7.4.6-3.14.2
php7-curl-7.4.6-3.14.2
php7-curl-debuginfo-7.4.6-3.14.2
php7-dba-7.4.6-3.14.2
php7-dba-debuginfo-7.4.6-3.14.2
php7-debuginfo-7.4.6-3.14.2
php7-debugsource-7.4.6-3.14.2
php7-devel-7.4.6-3.14.2
php7-dom-7.4.6-3.14.2
php7-dom-debuginfo-7.4.6-3.14.2
php7-enchant-7.4.6-3.14.2
php7-enchant-debuginfo-7.4.6-3.14.2
php7-exif-7.4.6-3.14.2
php7-exif-debuginfo-7.4.6-3.14.2
php7-fastcgi-7.4.6-3.14.2
php7-fastcgi-debuginfo-7.4.6-3.14.2
php7-fileinfo-7.4.6-3.14.2
php7-fileinfo-debuginfo-7.4.6-3.14.2
php7-fpm-7.4.6-3.14.2
php7-fpm-debuginfo-7.4.6-3.14.2
php7-ftp-7.4.6-3.14.2
php7-ftp-debuginfo-7.4.6-3.14.2
php7-gd-7.4.6-3.14.2
php7-gd-debuginfo-7.4.6-3.14.2
php7-gettext-7.4.6-3.14.2
php7-gettext-debuginfo-7.4.6-3.14.2
php7-gmp-7.4.6-3.14.2
php7-gmp-debuginfo-7.4.6-3.14.2
php7-iconv-7.4.6-3.14.2
php7-iconv-debuginfo-7.4.6-3.14.2
php7-intl-7.4.6-3.14.2
php7-intl-debuginfo-7.4.6-3.14.2
php7-json-7.4.6-3.14.2
php7-json-debuginfo-7.4.6-3.14.2
php7-ldap-7.4.6-3.14.2
php7-ldap-debuginfo-7.4.6-3.14.2
php7-mbstring-7.4.6-3.14.2
php7-mbstring-debuginfo-7.4.6-3.14.2
php7-mysql-7.4.6-3.14.2
php7-mysql-debuginfo-7.4.6-3.14.2
php7-odbc-7.4.6-3.14.2
php7-odbc-debuginfo-7.4.6-3.14.2
php7-opcache-7.4.6-3.14.2
php7-opcache-debuginfo-7.4.6-3.14.2
php7-openssl-7.4.6-3.14.2
php7-openssl-debuginfo-7.4.6-3.14.2
php7-pcntl-7.4.6-3.14.2
php7-pcntl-debuginfo-7.4.6-3.14.2
php7-pdo-7.4.6-3.14.2
php7-pdo-debuginfo-7.4.6-3.14.2
php7-pgsql-7.4.6-3.14.2
php7-pgsql-debuginfo-7.4.6-3.14.2
php7-phar-7.4.6-3.14.2
php7-phar-debuginfo-7.4.6-3.14.2
php7-posix-7.4.6-3.14.2
php7-posix-debuginfo-7.4.6-3.14.2
php7-readline-7.4.6-3.14.2
php7-readline-debuginfo-7.4.6-3.14.2
php7-shmop-7.4.6-3.14.2
php7-shmop-debuginfo-7.4.6-3.14.2
php7-snmp-7.4.6-3.14.2
php7-snmp-debuginfo-7.4.6-3.14.2
php7-soap-7.4.6-3.14.2
php7-soap-debuginfo-7.4.6-3.14.2
php7-sockets-7.4.6-3.14.2
php7-sockets-debuginfo-7.4.6-3.14.2
php7-sodium-7.4.6-3.14.2
php7-sodium-debuginfo-7.4.6-3.14.2
php7-sqlite-7.4.6-3.14.2
php7-sqlite-debuginfo-7.4.6-3.14.2
php7-sysvmsg-7.4.6-3.14.2
php7-sysvmsg-debuginfo-7.4.6-3.14.2
php7-sysvsem-7.4.6-3.14.2
php7-sysvsem-debuginfo-7.4.6-3.14.2
php7-sysvshm-7.4.6-3.14.2
php7-sysvshm-debuginfo-7.4.6-3.14.2
php7-tidy-7.4.6-3.14.2
php7-tidy-debuginfo-7.4.6-3.14.2
php7-tokenizer-7.4.6-3.14.2
php7-tokenizer-debuginfo-7.4.6-3.14.2
php7-xmlreader-7.4.6-3.14.2
php7-xmlreader-debuginfo-7.4.6-3.14.2
php7-xmlrpc-7.4.6-3.14.2
php7-xmlrpc-debuginfo-7.4.6-3.14.2
php7-xmlwriter-7.4.6-3.14.2
php7-xmlwriter-debuginfo-7.4.6-3.14.2
php7-xsl-7.4.6-3.14.2
php7-xsl-debuginfo-7.4.6-3.14.2
php7-zip-7.4.6-3.14.2
php7-zip-debuginfo-7.4.6-3.14.2
php7-zlib-7.4.6-3.14.2
php7-zlib-debuginfo-7.4.6-3.14.2
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (aarch64
ppc64le s390x x86_64):
php7-debuginfo-7.4.6-3.14.2
php7-debugsource-7.4.6-3.14.2
php7-embed-7.4.6-3.14.2
php7-embed-debuginfo-7.4.6-3.14.2
References:
o https://www.suse.com/security/cve/CVE-2020-7071.html
o https://bugzilla.suse.com/1180706
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for php72
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0125-1
Rating: moderate
References: #1180706
Cross-References: CVE-2020-7071
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for php72 fixes the following issue:
o CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted
URLs with invalid userinfo (bsc#1180706).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-125=1
o SUSE Linux Enterprise Module for Web Scripting 12:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2021-125=1
Package List:
o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
s390x x86_64):
php72-debuginfo-7.2.5-1.57.1
php72-debugsource-7.2.5-1.57.1
php72-devel-7.2.5-1.57.1
o SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x
x86_64):
apache2-mod_php72-7.2.5-1.57.1
apache2-mod_php72-debuginfo-7.2.5-1.57.1
php72-7.2.5-1.57.1
php72-bcmath-7.2.5-1.57.1
php72-bcmath-debuginfo-7.2.5-1.57.1
php72-bz2-7.2.5-1.57.1
php72-bz2-debuginfo-7.2.5-1.57.1
php72-calendar-7.2.5-1.57.1
php72-calendar-debuginfo-7.2.5-1.57.1
php72-ctype-7.2.5-1.57.1
php72-ctype-debuginfo-7.2.5-1.57.1
php72-curl-7.2.5-1.57.1
php72-curl-debuginfo-7.2.5-1.57.1
php72-dba-7.2.5-1.57.1
php72-dba-debuginfo-7.2.5-1.57.1
php72-debuginfo-7.2.5-1.57.1
php72-debugsource-7.2.5-1.57.1
php72-dom-7.2.5-1.57.1
php72-dom-debuginfo-7.2.5-1.57.1
php72-enchant-7.2.5-1.57.1
php72-enchant-debuginfo-7.2.5-1.57.1
php72-exif-7.2.5-1.57.1
php72-exif-debuginfo-7.2.5-1.57.1
php72-fastcgi-7.2.5-1.57.1
php72-fastcgi-debuginfo-7.2.5-1.57.1
php72-fileinfo-7.2.5-1.57.1
php72-fileinfo-debuginfo-7.2.5-1.57.1
php72-fpm-7.2.5-1.57.1
php72-fpm-debuginfo-7.2.5-1.57.1
php72-ftp-7.2.5-1.57.1
php72-ftp-debuginfo-7.2.5-1.57.1
php72-gd-7.2.5-1.57.1
php72-gd-debuginfo-7.2.5-1.57.1
php72-gettext-7.2.5-1.57.1
php72-gettext-debuginfo-7.2.5-1.57.1
php72-gmp-7.2.5-1.57.1
php72-gmp-debuginfo-7.2.5-1.57.1
php72-iconv-7.2.5-1.57.1
php72-iconv-debuginfo-7.2.5-1.57.1
php72-imap-7.2.5-1.57.1
php72-imap-debuginfo-7.2.5-1.57.1
php72-intl-7.2.5-1.57.1
php72-intl-debuginfo-7.2.5-1.57.1
php72-json-7.2.5-1.57.1
php72-json-debuginfo-7.2.5-1.57.1
php72-ldap-7.2.5-1.57.1
php72-ldap-debuginfo-7.2.5-1.57.1
php72-mbstring-7.2.5-1.57.1
php72-mbstring-debuginfo-7.2.5-1.57.1
php72-mysql-7.2.5-1.57.1
php72-mysql-debuginfo-7.2.5-1.57.1
php72-odbc-7.2.5-1.57.1
php72-odbc-debuginfo-7.2.5-1.57.1
php72-opcache-7.2.5-1.57.1
php72-opcache-debuginfo-7.2.5-1.57.1
php72-openssl-7.2.5-1.57.1
php72-openssl-debuginfo-7.2.5-1.57.1
php72-pcntl-7.2.5-1.57.1
php72-pcntl-debuginfo-7.2.5-1.57.1
php72-pdo-7.2.5-1.57.1
php72-pdo-debuginfo-7.2.5-1.57.1
php72-pgsql-7.2.5-1.57.1
php72-pgsql-debuginfo-7.2.5-1.57.1
php72-phar-7.2.5-1.57.1
php72-phar-debuginfo-7.2.5-1.57.1
php72-posix-7.2.5-1.57.1
php72-posix-debuginfo-7.2.5-1.57.1
php72-pspell-7.2.5-1.57.1
php72-pspell-debuginfo-7.2.5-1.57.1
php72-readline-7.2.5-1.57.1
php72-readline-debuginfo-7.2.5-1.57.1
php72-shmop-7.2.5-1.57.1
php72-shmop-debuginfo-7.2.5-1.57.1
php72-snmp-7.2.5-1.57.1
php72-snmp-debuginfo-7.2.5-1.57.1
php72-soap-7.2.5-1.57.1
php72-soap-debuginfo-7.2.5-1.57.1
php72-sockets-7.2.5-1.57.1
php72-sockets-debuginfo-7.2.5-1.57.1
php72-sodium-7.2.5-1.57.1
php72-sodium-debuginfo-7.2.5-1.57.1
php72-sqlite-7.2.5-1.57.1
php72-sqlite-debuginfo-7.2.5-1.57.1
php72-sysvmsg-7.2.5-1.57.1
php72-sysvmsg-debuginfo-7.2.5-1.57.1
php72-sysvsem-7.2.5-1.57.1
php72-sysvsem-debuginfo-7.2.5-1.57.1
php72-sysvshm-7.2.5-1.57.1
php72-sysvshm-debuginfo-7.2.5-1.57.1
php72-tidy-7.2.5-1.57.1
php72-tidy-debuginfo-7.2.5-1.57.1
php72-tokenizer-7.2.5-1.57.1
php72-tokenizer-debuginfo-7.2.5-1.57.1
php72-wddx-7.2.5-1.57.1
php72-wddx-debuginfo-7.2.5-1.57.1
php72-xmlreader-7.2.5-1.57.1
php72-xmlreader-debuginfo-7.2.5-1.57.1
php72-xmlrpc-7.2.5-1.57.1
php72-xmlrpc-debuginfo-7.2.5-1.57.1
php72-xmlwriter-7.2.5-1.57.1
php72-xmlwriter-debuginfo-7.2.5-1.57.1
php72-xsl-7.2.5-1.57.1
php72-xsl-debuginfo-7.2.5-1.57.1
php72-zip-7.2.5-1.57.1
php72-zip-debuginfo-7.2.5-1.57.1
php72-zlib-7.2.5-1.57.1
php72-zlib-debuginfo-7.2.5-1.57.1
o SUSE Linux Enterprise Module for Web Scripting 12 (noarch):
php72-pear-7.2.5-1.57.1
php72-pear-Archive_Tar-7.2.5-1.57.1
References:
o https://www.suse.com/security/cve/CVE-2020-7071.html
o https://bugzilla.suse.com/1180706
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for php74
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0126-1
Rating: moderate
References: #1180706
Cross-References: CVE-2020-7071
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for php74 fixes the following issue:
o CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted
URLs with invalid userinfo (bsc#1180706).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-126=1
o SUSE Linux Enterprise Module for Web Scripting 12:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2021-126=1
Package List:
o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
s390x x86_64):
php74-debuginfo-7.4.6-1.16.1
php74-debugsource-7.4.6-1.16.1
php74-devel-7.4.6-1.16.1
o SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x
x86_64):
apache2-mod_php74-7.4.6-1.16.1
apache2-mod_php74-debuginfo-7.4.6-1.16.1
php74-7.4.6-1.16.1
php74-bcmath-7.4.6-1.16.1
php74-bcmath-debuginfo-7.4.6-1.16.1
php74-bz2-7.4.6-1.16.1
php74-bz2-debuginfo-7.4.6-1.16.1
php74-calendar-7.4.6-1.16.1
php74-calendar-debuginfo-7.4.6-1.16.1
php74-ctype-7.4.6-1.16.1
php74-ctype-debuginfo-7.4.6-1.16.1
php74-curl-7.4.6-1.16.1
php74-curl-debuginfo-7.4.6-1.16.1
php74-dba-7.4.6-1.16.1
php74-dba-debuginfo-7.4.6-1.16.1
php74-debuginfo-7.4.6-1.16.1
php74-debugsource-7.4.6-1.16.1
php74-dom-7.4.6-1.16.1
php74-dom-debuginfo-7.4.6-1.16.1
php74-enchant-7.4.6-1.16.1
php74-enchant-debuginfo-7.4.6-1.16.1
php74-exif-7.4.6-1.16.1
php74-exif-debuginfo-7.4.6-1.16.1
php74-fastcgi-7.4.6-1.16.1
php74-fastcgi-debuginfo-7.4.6-1.16.1
php74-fileinfo-7.4.6-1.16.1
php74-fileinfo-debuginfo-7.4.6-1.16.1
php74-fpm-7.4.6-1.16.1
php74-fpm-debuginfo-7.4.6-1.16.1
php74-ftp-7.4.6-1.16.1
php74-ftp-debuginfo-7.4.6-1.16.1
php74-gd-7.4.6-1.16.1
php74-gd-debuginfo-7.4.6-1.16.1
php74-gettext-7.4.6-1.16.1
php74-gettext-debuginfo-7.4.6-1.16.1
php74-gmp-7.4.6-1.16.1
php74-gmp-debuginfo-7.4.6-1.16.1
php74-iconv-7.4.6-1.16.1
php74-iconv-debuginfo-7.4.6-1.16.1
php74-intl-7.4.6-1.16.1
php74-intl-debuginfo-7.4.6-1.16.1
php74-json-7.4.6-1.16.1
php74-json-debuginfo-7.4.6-1.16.1
php74-ldap-7.4.6-1.16.1
php74-ldap-debuginfo-7.4.6-1.16.1
php74-mbstring-7.4.6-1.16.1
php74-mbstring-debuginfo-7.4.6-1.16.1
php74-mysql-7.4.6-1.16.1
php74-mysql-debuginfo-7.4.6-1.16.1
php74-odbc-7.4.6-1.16.1
php74-odbc-debuginfo-7.4.6-1.16.1
php74-opcache-7.4.6-1.16.1
php74-opcache-debuginfo-7.4.6-1.16.1
php74-openssl-7.4.6-1.16.1
php74-openssl-debuginfo-7.4.6-1.16.1
php74-pcntl-7.4.6-1.16.1
php74-pcntl-debuginfo-7.4.6-1.16.1
php74-pdo-7.4.6-1.16.1
php74-pdo-debuginfo-7.4.6-1.16.1
php74-pgsql-7.4.6-1.16.1
php74-pgsql-debuginfo-7.4.6-1.16.1
php74-phar-7.4.6-1.16.1
php74-phar-debuginfo-7.4.6-1.16.1
php74-posix-7.4.6-1.16.1
php74-posix-debuginfo-7.4.6-1.16.1
php74-readline-7.4.6-1.16.1
php74-readline-debuginfo-7.4.6-1.16.1
php74-shmop-7.4.6-1.16.1
php74-shmop-debuginfo-7.4.6-1.16.1
php74-snmp-7.4.6-1.16.1
php74-snmp-debuginfo-7.4.6-1.16.1
php74-soap-7.4.6-1.16.1
php74-soap-debuginfo-7.4.6-1.16.1
php74-sockets-7.4.6-1.16.1
php74-sockets-debuginfo-7.4.6-1.16.1
php74-sodium-7.4.6-1.16.1
php74-sodium-debuginfo-7.4.6-1.16.1
php74-sqlite-7.4.6-1.16.1
php74-sqlite-debuginfo-7.4.6-1.16.1
php74-sysvmsg-7.4.6-1.16.1
php74-sysvmsg-debuginfo-7.4.6-1.16.1
php74-sysvsem-7.4.6-1.16.1
php74-sysvsem-debuginfo-7.4.6-1.16.1
php74-sysvshm-7.4.6-1.16.1
php74-sysvshm-debuginfo-7.4.6-1.16.1
php74-tidy-7.4.6-1.16.1
php74-tidy-debuginfo-7.4.6-1.16.1
php74-tokenizer-7.4.6-1.16.1
php74-tokenizer-debuginfo-7.4.6-1.16.1
php74-xmlreader-7.4.6-1.16.1
php74-xmlreader-debuginfo-7.4.6-1.16.1
php74-xmlrpc-7.4.6-1.16.1
php74-xmlrpc-debuginfo-7.4.6-1.16.1
php74-xmlwriter-7.4.6-1.16.1
php74-xmlwriter-debuginfo-7.4.6-1.16.1
php74-xsl-7.4.6-1.16.1
php74-xsl-debuginfo-7.4.6-1.16.1
php74-zip-7.4.6-1.16.1
php74-zip-debuginfo-7.4.6-1.16.1
php74-zlib-7.4.6-1.16.1
php74-zlib-debuginfo-7.4.6-1.16.1
References:
o https://www.suse.com/security/cve/CVE-2020-7071.html
o https://bugzilla.suse.com/1180706
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=SWZ1
-----END PGP SIGNATURE-----
ESB-2021.0196 - [SUSE] openldap2: Denial of service - Remote/unauthenticated
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0196
SUSE Security Update: Security update for openldap2
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: openldap2
Publisher: SUSE
Operating System: SUSE
Impact/Access: Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-25710 CVE-2020-25709
Reference: ESB-2020.4187
ESB-2020.4077
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210142-1
https://www.suse.com/support/update/announcement/2021/suse-su-202114597-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210129-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210128-1
Comment: This bulletin contains four (4) SUSE security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for openldap2
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0142-1
Rating: moderate
References: #1178909
Cross-References: CVE-2020-25709 CVE-2020-25710
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP5
SUSE Linux Enterprise Server for SAP 12-SP4
SUSE Linux Enterprise Server for SAP 12-SP3
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Module for Legacy Software 12
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for openldap2 fixes the following issues:
o CVE-2020-25709: Fixed a crash caused by specially crafted network traffic
(bsc#1178909).
o CVE-2020-25710: Fixed a crash caused by specially crafted network traffic
(bsc#1178909).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Server for SAP 12-SP5:
zypper in -t patch SUSE-SLE-SAP-12-SP5-2021-142=1
o SUSE Linux Enterprise Server for SAP 12-SP4:
zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-142=1
o SUSE Linux Enterprise Server for SAP 12-SP3:
zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-142=1
o SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2021-142=1
o SUSE Linux Enterprise Module for Legacy Software 12:
zypper in -t patch SUSE-SLE-Module-Legacy-12-2021-142=1
Package List:
o SUSE Linux Enterprise Server for SAP 12-SP5 (ppc64le x86_64):
compat-libldap-2_3-0-2.3.37-18.24.26.1
compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1
o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):
compat-libldap-2_3-0-2.3.37-18.24.26.1
compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1
o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
compat-libldap-2_3-0-2.3.37-18.24.26.1
compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1
o SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
compat-libldap-2_3-0-2.3.37-18.24.26.1
compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1
o SUSE Linux Enterprise Module for Legacy Software 12 (aarch64 ppc64le s390x
x86_64):
compat-libldap-2_3-0-2.3.37-18.24.26.1
compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1
References:
o https://www.suse.com/security/cve/CVE-2020-25709.html
o https://www.suse.com/security/cve/CVE-2020-25710.html
o https://bugzilla.suse.com/1178909
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for openldap2
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:14597-1
Rating: moderate
References: #1178909
Cross-References: CVE-2020-25709 CVE-2020-25710
Affected Products:
SUSE Linux Enterprise Server 11-SECURITY
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for openldap2 fixes the following issues:
o CVE-2020-25709: Fixed a crash caused by specially crafted network traffic
(bsc#1178909).
o CVE-2020-25710: Fixed a crash caused by specially crafted network traffic
(bsc#1178909).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Server 11-SECURITY:
zypper in -t patch secsp3-openldap2-14597=1
Package List:
o SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64):
libldap-openssl1-2_4-2-2.4.26-0.74.19.1
openldap2-client-openssl1-2.4.26-0.74.19.1
openldap2-openssl1-2.4.26-0.74.19.1
o SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64):
libldap-openssl1-2_4-2-32bit-2.4.26-0.74.19.1
o SUSE Linux Enterprise Server 11-SECURITY (ia64):
libldap-openssl1-2_4-2-x86-2.4.26-0.74.19.1
References:
o https://www.suse.com/security/cve/CVE-2020-25709.html
o https://www.suse.com/security/cve/CVE-2020-25710.html
o https://bugzilla.suse.com/1178909
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for openldap2
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0129-1
Rating: moderate
References: #1178909 #1179503
Cross-References: CVE-2020-25709 CVE-2020-25710
Affected Products:
SUSE Linux Enterprise Module for Legacy Software 15-SP2
SUSE Linux Enterprise Module for Development Tools 15-SP2
SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for openldap2 fixes the following issues:
Security issues fixed:
o CVE-2020-25709: Fixed a crash caused by specially crafted network traffic
(bsc#1178909).
o CVE-2020-25710: Fixed a crash caused by specially crafted network traffic
(bsc#1178909).
Non-security issue fixed:
o Retry binds in the LDAP backend when the remote LDAP server disconnected
the (idle) LDAP connection. (bsc#1179503)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for Legacy Software 15-SP2:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2021-129=1
o SUSE Linux Enterprise Module for Development Tools 15-SP2:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-129=1
o SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-129=1
Package List:
o SUSE Linux Enterprise Module for Legacy Software 15-SP2 (aarch64 ppc64le
s390x x86_64):
openldap2-2.4.46-9.45.1
openldap2-back-meta-2.4.46-9.45.1
openldap2-back-meta-debuginfo-2.4.46-9.45.1
openldap2-back-perl-2.4.46-9.45.1
openldap2-back-perl-debuginfo-2.4.46-9.45.1
openldap2-debuginfo-2.4.46-9.45.1
openldap2-debugsource-2.4.46-9.45.1
openldap2-ppolicy-check-password-1.2-9.45.1
openldap2-ppolicy-check-password-debuginfo-1.2-9.45.1
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (x86_64):
openldap2-debugsource-2.4.46-9.45.1
openldap2-devel-32bit-2.4.46-9.45.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
x86_64):
libldap-2_4-2-2.4.46-9.45.1
libldap-2_4-2-debuginfo-2.4.46-9.45.1
openldap2-client-2.4.46-9.45.1
openldap2-client-debuginfo-2.4.46-9.45.1
openldap2-debugsource-2.4.46-9.45.1
openldap2-devel-2.4.46-9.45.1
openldap2-devel-static-2.4.46-9.45.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
libldap-data-2.4.46-9.45.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64):
libldap-2_4-2-32bit-2.4.46-9.45.1
libldap-2_4-2-32bit-debuginfo-2.4.46-9.45.1
References:
o https://www.suse.com/security/cve/CVE-2020-25709.html
o https://www.suse.com/security/cve/CVE-2020-25710.html
o https://bugzilla.suse.com/1178909
o https://bugzilla.suse.com/1179503
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for openldap2
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0128-1
Rating: moderate
References: #1178909
Cross-References: CVE-2020-25709 CVE-2020-25710
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for openldap2 fixes the following issues:
o CVE-2020-25709: Fixed a crash caused by specially crafted network traffic
(bsc#1178909).
o CVE-2020-25710: Fixed a crash caused by specially crafted network traffic
(bsc#1178909).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-128=1
o SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-128=1
Package List:
o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
s390x x86_64):
openldap2-back-perl-2.4.41-18.80.1
openldap2-back-perl-debuginfo-2.4.41-18.80.1
openldap2-debuginfo-2.4.41-18.80.1
openldap2-debugsource-2.4.41-18.80.1
openldap2-devel-2.4.41-18.80.1
openldap2-devel-static-2.4.41-18.80.1
o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
libldap-2_4-2-2.4.41-18.80.1
libldap-2_4-2-debuginfo-2.4.41-18.80.1
openldap2-2.4.41-18.80.1
openldap2-back-meta-2.4.41-18.80.1
openldap2-back-meta-debuginfo-2.4.41-18.80.1
openldap2-client-2.4.41-18.80.1
openldap2-client-debuginfo-2.4.41-18.80.1
openldap2-debuginfo-2.4.41-18.80.1
openldap2-debugsource-2.4.41-18.80.1
openldap2-ppolicy-check-password-1.2-18.80.1
openldap2-ppolicy-check-password-debuginfo-1.2-18.80.1
o SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):
libldap-2_4-2-32bit-2.4.41-18.80.1
libldap-2_4-2-debuginfo-32bit-2.4.41-18.80.1
o SUSE Linux Enterprise Server 12-SP5 (noarch):
openldap2-doc-2.4.41-18.80.1
References:
o https://www.suse.com/security/cve/CVE-2020-25709.html
o https://www.suse.com/security/cve/CVE-2020-25710.html
o https://bugzilla.suse.com/1178909
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=G111
-----END PGP SIGNATURE-----
ESB-2021.0203 - [Juniper] Junos OS: Denial of service - Remote/unauthenticated
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0203
JSA11107 - 2021-01 Security Bulletin: Junos OS: EX Series and QFX Series:
Memory leak issue processing specific DHCP packets (CVE-2021-0217)
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Junos OS
Publisher: Juniper Networks
Operating System: Juniper
Impact/Access: Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-0217
Original Bulletin:
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11107
- --------------------------BEGIN INCLUDED TEXT--------------------
2021-01 Security Bulletin: Junos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets (CVE-2021-0217)
Article ID : JSA11107
Last Updated: 15 Jan 2021
Version : 2.0
Product Affected:
This issue affects Junos OS 17.4R3, 18.1R3, 18.2R3, 18.3R3, 18.4R2, 18.4R3,
19.1, 19.2, 19.3, 19.4, 20.1, 20.2. Affected platforms: EX Series, QFX Series.
Problem:
A vulnerability in processing of certain DHCP packets from adjacent clients on
EX Series and QFX Series switches running Juniper Networks Junos OS with DHCP
local/relay server configured may lead to exhaustion of DMA memory causing a
Denial of Service (DoS). Over time, exploitation of this vulnerability may
cause traffic to stop being forwarded, or to crashing of the fxpc process.
When Packet DMA heap utilization reaches 99%, the system will become unstable.
Packet DMA heap utilization can be monitored through the following command:
user@junos# request pfe execute target fpc0 timeout 30 command "show heap"
ID Base Total(b) Free(b) Used(b) % Name
- -- ---------- ----------- ----------- ----------- --- -----------
0 213301a8 536870488 387228840 149641648 27 Kernel
1 91800000 8388608 3735120 4653488 55 DMA
2 92000000 75497472 74452192 1045280 1 PKT DMA DESC
3 d330000 335544320 257091400 78452920 23 Bcm_sdk
4 96800000 184549376 2408 184546968 99 Packet DMA
5 903fffe0 20971504 20971504 0 0 Blob
An indication of the issue occurring may be observed through the following log
messages:
Dec 10 08:07:00.124 2020 hostname fpc0 brcm_pkt_buf_alloc:523 (buf alloc)
failed allocating packet buffer
Dec 10 08:07:00.126 2020 hostname fpc0 (buf alloc) failed allocating packet
buffer
Dec 10 08:07:00.128 2020 hostname fpc0 brcm_pkt_buf_alloc:523 (buf alloc)
failed allocating packet buffer
Dec 10 08:07:00.130 2020 hostnameC fpc0 (buf alloc) failed allocating packet
buffer
This issue affects Juniper Networks Junos OS on EX Series and QFX Series:
o 17.4R3 versions prior to 17.4R3-S3;
o 18.1R3 versions between 18.1R3-S6 and 18.1R3-S11;
o 18.2R3 versions prior to 18.2R3-S6;
o 18.3R3 versions prior to 18.3R3-S4;
o 18.4R2 versions prior to 18.4R2-S5;
o 18.4R3 versions prior to 18.4R3-S6;
o 19.1 versions between 19.1R2 and 19.1R3-S3;
o 19.2 versions prior to 19.2R3-S1;
o 19.3 versions prior to 19.3R2-S5, 19.3R3;
o 19.4 versions prior to 19.4R2-S2, 19.4R3;
o 20.1 versions prior to 20.1R2;
o 20.2 versions prior to 20.2R1-S2, 20.2R2.
Junos OS versions prior to 17.4R3 are unaffected by this vulnerability.
The following configuration snippet enables the DHCP relay forwarding option:
[forwarding-options dhcp-relay]
Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
This issue was seen during production usage.
This issue has been assigned CVE-2021-0217 .
Solution:
The following software releases have been updated to resolve this specific
issue: Junos OS 17.4R3-S3, 18.1R3-S11, 18.2R3-S6, 18.3R3-S4, 18.4R2-S5,
18.4R3-S6, 19.1R1-S6, 19.1R3-S3, 19.2R3-S1, 19.3R2-S5, 19.3R3, 19.4R2-S2,
19.4R3, 20.1R2, 20.2R1-S2, 20.2R2, 20.3R1, and all subsequent releases.
This issue is being tracked as 1514145 .
Workaround:
There are no available workarounds for this issue.
Implementation:
Software releases or updates are available for download at https://
www.juniper.net/support/downloads/ .
Modification History:
2021-01-13: Initial Publication.
2021-01-15: Removed redundant 18.4R2-S7 fixed release from SOLUTION field.
CVSS Score:
7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
Severity Level:
High
Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common
Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQIVAwUBYATUY+NLKJtyKPYoAQiFJA/9GghG3wix8C8jgD1gX+6BkgRSz/JShd2/
9l88oOrab8Ii7gYxOF23H1qOeOMj3gOB1eAMw3zUns3PcGwP/SKx3xgY1BJjDQw2
NbPl01l8zPW2n71MedmBQsOp5qq1F43NKGh4L6lxYlDjXoT4/67kiozSSDjEs8jK
jF3AA7N37ziLd+LnaYIYdwHleG+WBSGTfaDtH/8MbT7kEhjrV5yroRhj0DAwmfRl
LRh9AjMQ5sioyXoZsTy39Fa/MFjiG1cyTebca9ejHlYV5KhKJZrEwJZpvvHGY/+i
SjIIWh8dPNChJBYKUBjbhVSdmBQes9S/GNubz087zBO9aoewCw4XSpk1rz3IBczI
4C7WHDo5OTmMcrnVH4Ba1kk8S+0K6ObFfdyf11FSqNsvebfSDgA114UYfhbYDd55
w2QfwWn0I7Zg5NTQ4yq0eTvqvuauAEiofNeIhCPSq34VHtKjvzS7DluJGgHPQmvs
WjVsnzZTG6QZZoLN8vauAvC0htkqFRiOOEC2ZFfGpdZGcyK/Ftv4KOrPaLRH9iGy
tP6SDnQuLAXpEhY1xbzGyae1XBy1NKZCjXomdcXIZQIVJmre9gm9Pu7ShX5o+rBL
5tbuuJqU9BpB2zbPA/3JULnJGB6QR+CfPoGuRXp6/39f4XvF8Vvl9GQd1qSsigNf
peVQRGdle1E=
=75dK
-----END PGP SIGNATURE-----
ESB-2021.0198 - [Ubuntu] Ampache: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0198
USN-4693-1: Ampache vulnerabilities
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Ampache
Publisher: Ubuntu
Operating System: Ubuntu
Impact/Access: Administrator Compromise -- Existing Account
Cross-site Scripting -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2019-12386 CVE-2019-12385
Reference: ESB-2019.4240
Original Bulletin:
https://ubuntu.com/security/notices/USN-4693-1
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-4693-1: Ampache vulnerabilities
14 January 2021
Several security issues were fixed in Ampache.
Releases
o Ubuntu 16.04 LTS
Packages
o ampache - web-based audio file management system
Details
It was discovered that an SQL injection vulnerability exists in the Ampache
search engine. Any user able to perform searches could dump any data contained
in the database. An attacker could use this to disclose sensitive information.
(CVE-2019-12385)
It was discovered that an XSS vulnerability in Ampache. An attacker could use
this vulnerability to force an admin to create a new privileged user.
(CVE-2019-12386)
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 16.04
o ampache - 3.6-rzb2779+dfsg-0ubuntu9.2
o ampache-common - 3.6-rzb2779+dfsg-0ubuntu9.2
After a standard system update you need to restart ampache to make
all the necessary changes.
References
o CVE-2019-12386
o CVE-2019-12385
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQIVAwUBYATUHuNLKJtyKPYoAQhD2Q/+NiR2mSHIR+vB/EiYa4KTg0Dg7FTahuzg
+KiWwqONa/26qLo2QC8WD9V5h9QPl8cQiydkEv4NjdclNjPErBE4Pv2JMhvqBb4m
dDTg9cTzm288bJzieTgAv1S8kvsX7A2RIuzufgGTFAfF1bAXku8TcxzhR/y7i5ZP
aWx+bPh4Z8SjfiOI/UklDPoPRZWPDedo9+toIcufIipwPebTCDGY9fcQbSaw4Ynh
neWM+alrEozX25y+MVGchZbVut8YaALZP+SmPzqeJAd7PAfojPZIG7cVxSaVZMsf
YNx96OxgvnYyVs0iU41YD79AZhp5rjMAoUxRIqq5RlFIIhMngMPJaSLWBWRHhjEG
y3Bs6zoq/AWA9jz/HwaAVDDfvgYfTPxiTqkty1cTptrXZRiqmHMiU74loebXxNcg
xt4NoUerKlpduTT0wj2zo2NM6XTePh5ypDwbO183E/MVTOMBeTMhbU/HeIapL93b
g6P73FNT3FTjTXxgNcH7v4rMxIe06H4+wdFcEnL9qEG1ogPA0Hveo3aqJJ3Qiw0+
XWCJrEYldUIm/PHlCqIv928GzWwufQlGm2i7Q2gjjt/YCUbyV8WrO8gUelELXYgl
klyvek9LIvDVUFOsFs02V1Lrr2BhoMskT5f9iYOp+k3nK2Ixm3aq0r+fbHt1hzRt
sOMc1qGo6+g=
=umBY
-----END PGP SIGNATURE-----
ESB-2021.0195 - [Debian] wavpack: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0195
wavpack security update
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: wavpack
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2020-35738 CVE-2019-1010319 CVE-2019-1010317
CVE-2019-1010315 CVE-2019-11498 CVE-2018-19841
CVE-2018-19840
Reference: ESB-2021.0062
ESB-2020.1522
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2525-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
January 15, 2021 https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------
Package : wavpack
Version : 5.0.0-2+deb9u3
CVE ID : CVE-2018-19840 CVE-2018-19841 CVE-2019-11498
CVE-2019-1010315 CVE-2019-1010317
CVE-2019-1010319 CVE-2020-35738
Debian Bug : 915564 915565 932060 932061 927903 978548
Multiple vulnerabilites in wavpack were found, like OOB read
(which could potentially lead to a DOS attack), unexpected
control flow, crashes, integer overflow, and segfaults.
For Debian 9 stretch, these problems have been fixed in version
5.0.0-2+deb9u3.
We recommend that you upgrade your wavpack packages.
For the detailed security status of wavpack please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wavpack
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmABaXsACgkQgj6WdgbD
S5aJrg/+IN3Qo681oqQ8UhGMoY7sORVnwsIrTFj9PkMPsOPCQY5FOPHPPGDYJAvT
k9YkskGwtwnTn1wjnSrzpFEh74rOaWmEvdLoy7U4Cyqgqip0MeBw0PfTUAtytLis
JIbcUhHvLHZwTQYG8BLwFuud9IjaX2a5xeVc+O5dGn5mOI4XOc9IO4h5uGOrkfod
2X5rhH5ft+D5kMNcJaboxvnNe+lAEi/ea779uXuB6va1UEmEtQUbi8LuaIopCt9c
Mte4/nLPVxCL9fwsdoaP6Le1BDois6AL1JzAdw8/btJibJUmQ6Ji1z6z6x47afNX
mudxqCPs7F911EPGB9XFVMry30OqucghxJzqIO3MUiTnnPI8NUXBbUJcW98L+AKi
4OVaC2BoZKpAEOSaOJeLLBBkz0fU0yJfeE4vP51Kad4JdIG5+8K4xvsm++Yf+Kdo
aSgYLeAwaPBCs2SOOwzWM5RI0BNwf0STmYJw14UJq76eBZYgdQw0CuUnq9dU21xm
3uesY3RiUnbOhb8z18EdDzMGZjgM7rIdROwWPbvD1UvAefbViCLEzVPvVBGtbKsU
/9cA7IyTOjaXywxvJW59ONCah1IodaEGtqEonA5yjbe/z4vtihSRjJLd71LWilYN
2V1NH7ow/Z4NJdra/9xIqj9+BgdmD00pGqN3WL5OPTHcwnBiOeY=
=7FNQ
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=lbrY
-----END PGP SIGNATURE-----
ESB-2021.0194 - [Debian] snapd: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0194
snapd security update
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: snapd
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Access Confidential Data -- Remote/Unauthenticated
Reduced Security -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2019-11840
Reference: ESB-2019.2367
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2021/01/msg00015.html
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2527-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Brian May
January 18, 2021 https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------
Package : snapd
Version : 2.21-2+deb9u1
CVE ID : CVE-2019-11840
golang-go.crypto was recently updated with a fix for CVE-2019-11840. This in
turn requires all packages that use the affected code to be recompiled in order
to pick up the security fix.
CVE-2019-11840
An issue was discovered in supplementary Go cryptography libraries, aka
golang-googlecode-go-crypto. If more than 256 GiB of keystream is
generated, or if the counter otherwise grows greater than 32 bits, the amd64
implementation will first generate incorrect output, and then cycle back to
previously generated keystream. Repeated keystream bytes can lead to loss of
confidentiality in encryption applications, or to predictability in CSPRNG
applications.
For Debian 9 stretch, this problem has been fixed in version
2.21-2+deb9u1.
We recommend that you upgrade your snapd packages.
For the detailed security status of snapd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/snapd
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEKpwfR8DOwu5vyB4TKpJZkldkSvoFAmAEqecACgkQKpJZkldk
SvoQLg//c/lgWl8t2By4anfuAS3NbIO0pHvEpvZ9bw1CuffMFUG+DAIdjUYR9LHT
T/dfrZccoJh+CKo7dU/vCKJDZaBdIdDzX420oQQQ+4MxUEpkq1iFlyy3UblV4mL6
79wpQY6QCEr/ytycl82NJSXUNo38EBH97lf3W9XeBm4cPscYbBBjbIpXD6748jNo
e80KHNrVhQEbEUjEWbekgEgwSWGBnjIoImBQaZWvT3xiR6HkuTAnoF7FS6LbGUqe
/IQa4FlyLzXU6JSWDkKgzgXVTdfrlVwH3cdElqIK2Rv/IA0Lm9gokzFQ+AZ4j7VH
TDX2Sn+q6ls8MTohDDxi+byTVwBP0P9SnKyRKxSkcf9n5SzUyt16AtJdGcwn+bj4
0l+2nRZOjqMzXPCPQTFSfrdRONXyACeDftnScv+a1eFknQKvurskkLfeoqFG8mvN
pgDQ00RQrT9YzD0L00OKMpL7c02f/cAH+3kiIlhXqpGk8m9xusZeFE/et7zihOCp
aO7sS+hrl6Sve9JVVLWwjlttNTFgyK3S7w7yf+AJ7lhAzRYKTsNyDojYk3Oafuve
2YM8+6PxFN7QUQh6nDTe5Yc59bjifPXOJs0X8xEyPIDJs6i7KtvnsH+et82vHP1e
Bvg/7eEKavqLKjp7UxSKTW2Kl7EqnpYma4bmLu9fe4g8ZQoY3Rs=
=Dw9o
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=OUJs
-----END PGP SIGNATURE-----
ESB-2021.0193 - [Debian] chromium: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0193
chromium security update
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: chromium
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Reduced Security -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21116 CVE-2021-21115 CVE-2021-21114
CVE-2021-21113 CVE-2021-21112 CVE-2021-21111
CVE-2021-21110 CVE-2021-21109 CVE-2021-21108
CVE-2021-21107 CVE-2021-21106 CVE-2020-16043
CVE-2020-15995
Reference: ASB-2021.0002
ESB-2021.0074
Original Bulletin:
https://www.debian.org/security/2021/dsa-4832
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4832-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 16, 2021 https://www.debian.org/security/faq
- - -------------------------------------------------------------------------
Package : chromium
CVE ID : CVE-2020-15995 CVE-2020-16043 CVE-2021-21106 CVE-2021-21107
CVE-2021-21108 CVE-2021-21109 CVE-2021-21110 CVE-2021-21111
CVE-2021-21112 CVE-2021-21113 CVE-2021-21114 CVE-2021-21115
CVE-2021-21116
Debian Bug : 979533
Multiple security issues were discovered in the Chromium web browser, which
could result in the execution of arbitrary code, denial of service
or information disclosure.
For the stable distribution (buster), these problems have been fixed in
version 87.0.4280.141-0.1~deb10u1.
We recommend that you upgrade your chromium packages.
For the detailed security status of chromium please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/chromium
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAC8mNfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0T2SQ//VcNAklJGO2KF1dGhC1DI4N+CEL30/Tr2ebKBUmiviiI+jyvwWpdqhKH6
+SG+gGNdTU5YkNL4++bWfaqaPhras8f0rvyFQX788z4/c+ek6tfRmLyeQY0BiHiH
X+qYNUkWWYSkJznTTRpTGCeX+VxJjZPj268bY3aV8KugpmnxJ5ilTZ4WSR6s0YQP
XjD876xj1OS4Z6Cw7jLwwJxIc4IOBsNqHJUmfawVLUbWHtsHxljxyFMH9EvC4oGs
uDnCvqcSCxLNuXaHQVpjhgdHXH1zY/rM8TtwPWC4vR6FjXe+f5cpglvCd2xCjoQl
rybm0WyFiUGVfTqqjOuE/kbtjcdiCcTzq8aREcgjasNCQo1DO90EtgbRKvBao4uU
So0GhbPxI5D6a4pz+ExhNKPN5zLewvY+2rBMCbsi5emPqwk53EOCE6aVb41FsL/V
FRdV9hNql9TXsv0PDuBQ86Ozt5/Yf2+gU+BcHc9ng/vq5fz7PQ/Jp6LL1qHH3tlm
7jcjJO58YRP6cgxGcf4om7WU+yJP2TOP3VP1h9HBlC4RjgLoD+c/YfCr2JMiOikX
lSmUb1MWNN5w85Cyz4NUv2rRwKZUZeSaMW4WrCc0ZNOA6AemLqfZTTQmdm4/H7+M
7g/Kzl3I1mudmycNU95irf3cgvOeO6rct+hu8jvhRUSr6PN2YzM=
=wU5Y
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQIVAwUBYATTz+NLKJtyKPYoAQhZPQ/9FAOHvxJvmXZ8jKNoW/Kek1rdPxxQYcgd
bniagSrin9Z7HlkNk9E8XTBaiej8xUQKgIV+QH7EPau8/tA0JMSmqYfQnpcj1YrY
+Fz0HDMMoTF6xW+aEuXBkRs4L/gC1j/Vtm+iZ9AHOFTec8zs45IyhBVSQOjvh5uY
E7DZckliWerUaIsj62yRxUlCqzkzQ9tjjpey4ioYeIzLoSlvggxUrsWjUfCujXPR
08Sxmg7GivqxTXVPHfb2JCaU8YGa99NbV08Quv9m1l3fZFkxGfIeSzzq6pMYGbOC
AlzqQjctABw7Y8REF2aRUfj8tyNOEtsW8jEoFEcqh7IVYgOxik1ilEf6Jg2Up4IN
augbDDP5Z4NU1P7wTBQ8tyK+535BX0h3o3krrUEpML5FmToEcfnkMW3wy1a83gaY
oulKkK4smt9lBfBPqA0SOwytYsADpOWTJzxM3mMaUTycBBh3mZP8CXQHn7hchtae
kOjoscq5oTTyHPy6641897dOJr+lzA3ARz/VZ/MOj9yHE1fTheeDclJ6waPDrSCD
DshbSjG9Q9FaeH3EEMg8SIJ5VO9/wroFLJ9lOYVHP0H3/fvu2cJQZTuBwN6aSGgM
qk0YtHm7uy8OpKK4zgqejHlz0ZTYUiV3prcrmc6NuOHTAFHYubwZ0T9Q6X74ps+6
GS3JUUtFy7A=
=zZNd
-----END PGP SIGNATURE-----
ESB-2021.0192 - [UNIX/Linux][Debian] ruby-redcarpet: Cross-site scripting - Remote with user interaction
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0192
ruby-redcarpet security update
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: ruby-redcarpet
Publisher: Debian
Operating System: Debian GNU/Linux
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Cross-site Scripting -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2020-26298
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2021/01/msg00014.html
https://www.debian.org/security/2021/dsa-4831
Comment: This bulletin contains two (2) Debian security advisories.
This advisory references vulnerabilities in products which run on
platforms other than Debian. It is recommended that administrators
running ruby-redcarpet check for an updated version of the software
for their operating system.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2526-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
January 15, 2021 https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------
Package : ruby-redcarpet
Version : 3.3.4-2+deb9u1
CVE ID : CVE-2020-26298
Debian Bug : 980057
In Redcarpet before version 3.5.1, there is an injection
vulnerability which can enable a cross-site scripting attack.
In affected versions, no HTML escaping was being performed when
processing quotes. This applies even when the `:escape_html`
option was being used.
For Debian 9 stretch, this problem has been fixed in version
3.3.4-2+deb9u1.
We recommend that you upgrade your ruby-redcarpet packages.
For the detailed security status of ruby-redcarpet please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ruby-redcarpet
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----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=y3i8
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4831-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
January 15, 2021 https://www.debian.org/security/faq
- - -------------------------------------------------------------------------
Package : ruby-redcarpet
CVE ID : CVE-2020-26298
Debian Bug : 980057
Johan Smits discovered that ruby-redcarpet, a markdown parser, did not
properly validate its input. This would allow an attacker to mount a
cross-site scripting attack.
For the stable distribution (buster), this problem has been fixed in
version 3.4.0-4+deb10u1.
We recommend that you upgrade your ruby-redcarpet packages.
For the detailed security status of ruby-redcarpet please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ruby-redcarpet
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmABkzwACgkQEL6Jg/PV
nWSUJAf/S5a13rCfo6KGpWr3h1YAyuUlH8pFdM3zytlvX7tLDZMIQon1OL0fKecP
lPDVE90EJoLBUUxdF1rSYWSQDS4fbCvSVuzcUqGrwgWvmEjL3rUTqaK189KB32sE
1wmGfqz0MS0ZBSAkPWLqkuMgRhP4SL2H78W9nssdLlC/eZ9G0kM1gTVOzQlrRVrc
BNKX73zMfwP2LREWXpjMCpu6IxfNHaIWQHjWbDwWb92qbz0LAnujExo0PoKWGsvR
5DSYS+rasHfUr8VWGopKMZQp4AfFBKH+oAG2qpPpwGwRda9bI88yfT6hXtctpfDz
kn5ERoIrC6OgXOEO9LnbLAUsEtCSSg==
=D3qU
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=Fed+
-----END PGP SIGNATURE-----
ESB-2021.0189.2 - UPDATE [SUSE] linux kernel: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0189.2
Security update for the Linux Kernel
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: linux kernel
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Root Compromise -- Existing Account
Access Privileged Data -- Existing Account
Modify Arbitrary Files -- Existing Account
Denial of Service -- Existing Account
Access Confidential Data -- Existing Account
Reduced Security -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2020-36158 CVE-2020-29661 CVE-2020-29660
CVE-2020-29373 CVE-2020-29370 CVE-2020-28374
CVE-2020-27830 CVE-2020-27825 CVE-2020-27786
CVE-2020-27777 CVE-2020-27068 CVE-2020-11668
CVE-2020-4788 CVE-2020-0466 CVE-2020-0465
CVE-2020-0444 CVE-2019-20934 CVE-2018-20669
Reference: ESB-2021.0166
ESB-2020.4410
ESB-2020.4275.2
ESB-2020.3888
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210117-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210118-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210133-1
Comment: This bulletin contains three (3) SUSE security advisories.
Revision History: January 18 2021: Vendor released associated suse-su-20210133-1
January 15 2021: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0117-1
Rating: moderate
References: #1040855 #1044120 #1044767 #1055117 #1065729 #1094840
#1109695 #1115431 #1138374 #1139944 #1149032 #1152457
#1152472 #1152489 #1155518 #1156315 #1156395 #1158775
#1161099 #1163727 #1165933 #1167657 #1168952 #1171000
#1171078 #1171688 #1172145 #1172733 #1174486 #1175079
#1175480 #1175995 #1176396 #1176942 #1176956 #1177326
#1177500 #1177666 #1177679 #1177733 #1178049 #1178203
#1178270 #1178372 #1178590 #1178612 #1178634 #1178660
#1178756 #1178780 #1179107 #1179204 #1179419 #1179434
#1179435 #1179519 #1179575 #1179578 #1179601 #1179604
#1179639 #1179652 #1179656 #1179670 #1179671 #1179672
#1179673 #1179675 #1179676 #1179677 #1179678 #1179679
#1179680 #1179681 #1179682 #1179683 #1179684 #1179685
#1179687 #1179688 #1179689 #1179690 #1179703 #1179704
#1179707 #1179709 #1179710 #1179711 #1179712 #1179713
#1179714 #1179715 #1179716 #1179745 #1179763 #1179888
#1179892 #1179896 #1179960 #1179963 #1180027 #1180029
#1180031 #1180052 #1180056 #1180086 #1180117 #1180258
#1180261 #1180506 #1180541 #1180559 #1180566
Cross-References: CVE-2020-0444 CVE-2020-0465 CVE-2020-0466 CVE-2020-11668
CVE-2020-27068 CVE-2020-27777 CVE-2020-27786 CVE-2020-27825
CVE-2020-27830 CVE-2020-28374 CVE-2020-29370 CVE-2020-29373
CVE-2020-29660 CVE-2020-29661 CVE-2020-36158
Affected Products:
SUSE Linux Enterprise Workstation Extension 15-SP2
SUSE Linux Enterprise Module for Live Patching 15-SP2
SUSE Linux Enterprise Module for Legacy Software 15-SP2
SUSE Linux Enterprise Module for Development Tools 15-SP2
SUSE Linux Enterprise Module for Basesystem 15-SP2
SUSE Linux Enterprise High Availability 15-SP2
______________________________________________________________________________
An update that solves 15 vulnerabilities and has 98 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security
and bugfixes.
The following security bugs were fixed:
o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
o CVE-2020-36158: Fixed a potential remote code execution in the Marvell
mwifiex driver (bsc#1180559).
o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc
#1179960).
o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl
and ep_loop_check_proc of eventpoll.c (bnc#1180031).
o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check
in the nl80211_policy policy of nl80211.c (bnc#1180086).
o CVE-2020-0444: Fixed a bad kfree due to a logic error in
audit_data_to_entry (bnc#1180027).
o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c
that could have led to local privilege escalation (bnc#1180029).
o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a
use-after-free attack against TIOCSPGRP (bsc#1179745).
o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may
have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction
Services (RTAS) interface, affecting guests running on top of PowerVM or
KVM hypervisors (bnc#1179107).
o CVE-2020-29373: Fixed an unsafe handling of the root directory during path
lookups in fs/io_uring.c (bnc#1179434).
o CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink
camera USB driver (bnc#1168952).
o CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
o CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#
1179435).
o CVE-2020-27786: Fixed a use after free in kernel midi subsystem
snd_rawmidi_kernel_read1() (bsc#1179601).
The following non-security bugs were fixed:
o ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#
SLE-16610).
o ACPI: PNP: compare the string length in the matching_id() (git-fixes).
o ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G
(git-fixes).
o ALSA: core: memalloc: add page alignment for iram (git-fixes).
o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
o ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
o ALSA: hda/hdmi: packet buffer index must be set before reading value
(git-fixes).
o ALSA: hda/proc - print DP-MST connections (git-fixes).
o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
o ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button
(git-fixes).
o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255
(git-fixes).
o ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256
(git-fixes).
o ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model
(git-fixes).
o ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
o ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294
(git-fixes).
o ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14
(git-fixes).
o ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop
(git-fixes).
o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
o ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).
o ALSA: seq: remove useless function (git-fixes).
o ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
o ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
o ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
o ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
o ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
o ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
o ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
o ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
o ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices
(git-fixes).
o ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
o ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
o ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#
1178203).
o ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#
1178203).
o ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
o ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
o ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#
1178203).
o ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
o ALSA: usb-audio: Disable sample read check if firmware does not give back
(git-fixes).
o ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#
1178203).
o ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc
#1178203).
o ALSA: usb-audio: Drop debug.h (bsc#1178203).
o ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
o ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
o ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
o ALSA: usb-audio: Fix control 'access overflow' errors from chmap
(git-fixes).
o ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
o ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
o ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#
1178203).
o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
o ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
o ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#
1178203).
o ALSA: usb-audio: Improve some debug prints (bsc#1178203).
o ALSA: usb-audio: Move device rename and profile quirks to an internal table
(bsc#1178203).
o ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc
#1178203).
o ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#
1178203).
o ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
o ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
o ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
o ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
o ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
o ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
o ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#
1178203).
o ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#
1178203).
o ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
o ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
o ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
o ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
o ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#
1178203).
o ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
o ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
o ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#
1178203).
o ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#
1178203).
o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
o ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo
(bsc#1178203).
o ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
o ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
o ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#
1178203).
o ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
o arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#
SLE-16610).
o ASoC: amd: change clk_get() to devm_clk_get() and add missed checks
(git-fixes).
o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams
(git-fixes).
o ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks
(git-fixes).
o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
o ASoC: meson: fix COMPILE_TEST error (git-fixes).
o ASoC: pcm: DRAIN support reactivation (git-fixes).
o ASoC: SOF: control: fix size checks for ext_bytes control .get()
(git-fixes).
o ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode
(git-fixes).
o ASoC: tegra20-spdif: remove "default m" (git-fixes).
o ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params
(git-fixes).
o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
o ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control()
(git-fixes).
o ath10k: Fix an error handling path (git-fixes).
o ath10k: Release some resources in an error handling path (git-fixes).
o ath6kl: fix enum-conversion warning (git-fixes).
o batman-adv: Consider fragmentation for needed_headroom (git-fixes).
o batman-adv: Do not always reallocate the fragmentation skb head
(git-fixes).
o batman-adv: Reserve needed_*room for fragments (git-fixes).
o blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
o block: return status code in blk_mq_end_request() (bsc#1171000, bsc#
1165933).
o Bluetooth: btmtksdio: Add the missed release_firmware() in
mtk_setup_firmware() (git-fixes).
o Bluetooth: btusb: Add the missed release_firmware() in
btusb_mtk_setup_firmware() (git-fixes).
o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
(git-fixes).
o Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
o bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
o btrfs: add missing check for nocow and compression inode flags (bsc#
1178780).
o btrfs: allow btrfs_truncate_block() to fallback to nocow for data space
reservation (bsc#1161099).
o btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
o btrfs: do not commit logs and transactions during link and rename
operations (bsc#1180566).
o btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc
#1180566).
o btrfs: fix readahead hang and use-after-free after removing a device (bsc#
1179963).
o btrfs: fix use-after-free on readahead extent after failure to create it
(bsc#1179963).
o btrfs: qgroup: do not commit transaction when we already hold the handle
(bsc#1178634).
o btrfs: qgroup: do not try to wait flushing if we're already holding a
transaction (bsc#1179575).
o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
o can: c_can: c_can_power_up(): fix error handling (git-fixes).
o can: sja1000: sja1000_err(): do not count arbitration lose as an error
(git-fixes).
o can: softing: softing_netdev_open(): fix error handling (git-fixes).
o can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error
(git-fixes).
o cfg80211: initialize rekey_data (git-fixes).
o cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
o cifs: do not share tcons with DFS (bsc#1178270).
o cifs: document and cleanup dfs mount (bsc#1178270).
o cifs: ensure correct super block for DFS reconnect (bsc#1178270).
o cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
o cifs: fix check of tcon dfs in smb1 (bsc#1178270).
o cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
o cifs: fix double free error on share and prefix (bsc#1178270).
o cifs: fix leaked reference on requeued write (bsc#1178270).
o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
o cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
o cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#
1178270).
o cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
o cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
o cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
o cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#
1178270).
o cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#
1178270).
o cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
o cifs: rename reconn_inval_dfs_target() (bsc#1178270).
o cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
o clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
o clk: ingenic: Fix divider calculation with div tables (git-fixes).
o clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
o clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
o clk: s2mps11: Fix a resource leak in error handling paths in the probe
function (git-fixes).
o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
o clk: tegra: Do not return 0 on failure (git-fixes).
o clk: tegra: Fix duplicated SE clock entry (git-fixes).
o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
o clocksource/drivers/arm_arch_timer: Correct fault programming of
CNTKCTL_EL1.EVNTI (git-fixes).
o clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne
(git-fixes).
o clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent()
(git-fixes).
o clocksource/drivers/orion: Add missing clk_disable_unprepare() on error
path (git-fixes).
o compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use
(bsc#1178203).
o coredump: fix core_pattern parse error (git-fixes).
o cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
o crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
o crypto: crypto4xx - Replace bitwise OR with logical OR in
crypto4xx_build_pd (git-fixes).
o crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
o crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe
(git-fixes).
o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
o crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
o crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
o crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
o cw1200: fix missing destroy_workqueue() on error in cw1200_init_common
(git-fixes).
o dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe()
(git-fixes).
o drivers: soc: ti: knav_qmss_queue: Fix error return code in
knav_queue_probe (git-fixes).
o drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#
1152489)
o drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting
changes: * context fixes
o drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
o drm/gma500: fix error check (bsc#1152472) Backporting changes: * context
fixes
o drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489)
Backporting changes: * context fixes
o drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: *
context fixes * adapted I/O functions to old driver
o drm/imx: tve remove extraneous type qualifier (bsc#1152489)
o drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#
1152472)
o drm/mediatek: Add missing put_device() call in (bsc#1152472)
o drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#
1152472) Backporting changes: * context fixes * adapted to function layout
o drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
o drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489)
Backporting changes: * context fixes
o drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
o drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472)
Backporting changes: * context fixes
o drm/radeon: Prefer lower feedback dividers (bsc#1152489)
o drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
o drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
o drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting
changes: * context fixes
o drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting
changes: * context fixes
o drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: *
changed filename from vkms_composer.c to vkms_crc.c * context fixes
o drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: *
context fixes
o drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: *
context fixes
o drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
o drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472)
Backporting changes: * context fixes
o drm: rcar-du: Put reference to VSP device (bsc#1152489)
o EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
o EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
o EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#
1152489).
o epoll: Keep a reference on files added to the check list (bsc#1180031).
o ethtool: fix error handling in ethtool_phys_id (git-fixes).
o ext4: correctly report "not supported" for {usr,grp}jquota when !
CONFIG_QUOTA (bsc#1179672).
o ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
o ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
o ext4: limit entries returned when counting fsmap records (bsc#1179671).
o ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#
1179673).
o extcon: max77693: Fix modalias string (git-fixes).
o fail_function: Remove a redundant mutex unlock (bsc#1149032).
o fbcon: Remove the superfluous break (bsc#1152472)
o firmware: arm_sdei: Document the motivation behind these set_fs() calls
(jsc#SLE-16610).
o fix regression in "epoll: Keep a reference on files added to the check
list" (bsc#1180031, git-fixes).
o fs/minix: check return value of sb_getblk() (bsc#1179676).
o fs/minix: do not allow getting deleted inodes (bsc#1179677).
o fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
o fs/minix: reject too-large maximum file size (bsc#1179678).
o fs/minix: remove expected error message in block_to_path() (bsc#1179681).
o fs/minix: set s_maxbytes correctly (bsc#1179679).
o fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
o fs: Do not invalidate page buffers in block_write_full_page() (bsc#
1179711).
o ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
o geneve: pull IP header before ECN decapsulation (git-fixes).
o genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#
1065729).
o genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#
1156315).
o gpio: mvebu: fix potential user-after-free on probe (git-fixes).
o gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
o HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices
(git-fixes).
o HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
o HID: add support for Sega Saturn (git-fixes).
o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
o HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
o HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses
(git-fixes).
o HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo
Edge (git-fixes).
o HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
o HMAT: Register memory-side cache after parsing (bsc#1178660).
o HMAT: Skip publishing target info for nodes with no online memory (bsc#
1178660).
o HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
o i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
o IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
o IB/mlx4: Add and improve logging (bsc#1152489)
o IB/mlx4: Add support for MRA (bsc#1152489)
o IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
o IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
o IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
o IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
o IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
o IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
o ibmvnic: add some debugs (bsc#1179896 ltc#190255).
o ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
o ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#
184239 git-fixes).
o ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098
git-fixes).
o ibmvnic: enhance resetting status check during module exit (bsc#1065729).
o ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853
git-fixes).
o ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855
ltc#155067 git-fixes).
o ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
o ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#
155423 git-fixes).
o ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432
git-fixes).
o iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in
rockchip_saradc_resume (git-fixes).
o iio: buffer: Fix demux update (git-fixes).
o iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
o iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
o iio:imu:bmi160: Fix too large a buffer (git-fixes).
o iio:light:rpr0521: Fix timestamp alignment and prevent data leak
(git-fixes).
o iio:light:st_uvis25: Fix timestamp alignment and prevent data leak
(git-fixes).
o iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
o iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
o inet_ecn: Fix endianness of checksum update when setting ECT(1)
(git-fixes).
o Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
o Input: ads7846 - fix race that causes missing releases (git-fixes).
o Input: ads7846 - fix unaligned access on 7845 (git-fixes).
o Input: cm109 - do not stomp on control URB (git-fixes).
o Input: cros_ec_keyb - send 'scancodes' in addition to key events
(git-fixes).
o Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet
(git-fixes).
o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
o Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
o Input: i8042 - allow insmod to succeed on devices without an i8042
controller (git-fixes).
o Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
o Input: omap4-keypad - fix runtime PM error handling (git-fixes).
o Input: xpad - support Ardwiino Controllers (git-fixes).
o iomap: Clear page error before beginning a write (bsc#1179683).
o iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
o iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
o iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
o iwlwifi: mvm: hook up missing RX handlers (git-fixes).
o iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
o iwlwifi: pcie: limit memory read spin time (git-fixes).
o jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
o kABI workaround for HD-audio generic parser (git-fixes).
o kABI workaround for USB audio driver (bsc#1178203).
o kABI: genirq: add back irq_create_mapping (bsc#1065729).
o kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc
#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
o KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#
1156395).
o lan743x: fix for potential NULL pointer dereference with bare card
(git-fixes).
o libfs: fix error cast of negative value in simple_attr_write() (bsc#
1179709).
o locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#
1149032).
o mac80211: do not set set TDLS STA bandwidth wider than possible
(git-fixes).
o mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#
1163727).
o md-cluster: fix safemode_delay value when converting to clustered bitmap
(bsc#1163727).
o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
o md/cluster: block reshape with remote resync job (bsc#1163727).
o md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
o media: gspca: Fix memory leak in probe (git-fixes).
o media: imx214: Fix stop streaming (git-fixes).
o media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE
(git-fixes).
o media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
o media: ipu3-cio2: Return actual subdev format (git-fixes).
o media: ipu3-cio2: Serialise access to pad format (git-fixes).
o media: ipu3-cio2: Validate mbus format in setting subdev format
(git-fixes).
o media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
o media: msi2500: assign SPI bus number dynamically (git-fixes).
o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm
() (git-fixes).
o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm
() (git-fixes).
o media: mtk-vcodec: add missing put_device() call in
mtk_vcodec_release_dec_pm() (git-fixes).
o media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
o media: siano: fix memory leak of debugfs members in smsdvb_hotplug
(git-fixes).
o media: solo6x10: fix missing snd_card_free in error handling case
(git-fixes).
o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
o media: tm6000: Fix sizeof() mismatches (git-fixes).
o media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#
1180117).
o memstick: fix a double-free bug in memstick_check (git-fixes).
o memstick: r592: Fix error return in r592_probe() (git-fixes).
o mfd: rt5033: Fix errorneous defines (git-fixes).
o mm,memory_failure: always pin the page in madvise_inject_error (bsc#
1180258).
o mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
o mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
o mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault()
(bsc#1179204).
o mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
o mmc: block: Fixup condition for CMD13 polling for RPMB requests
(git-fixes).
o mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
o mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
o mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
o mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
o mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments
(git-fixes).
o mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
o mtd: spinand: Fix OOB read (git-fixes).
o mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
o net/x25: prevent a couple of overflows (bsc#1178590).
o net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
o nfc: s3fwrn5: Release the nfc firmware (git-fixes).
o nvme-fabrics: allow to queue requests for live queues (git-fixes).
o nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#
1179519).
o nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt
context (bsc#1177326).
o nvme-fc: cancel async events before freeing event struct (git-fixes).
o nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#
1177326).
o nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
o nvme-fc: fix io timeout to abort I/O (bsc#1177326).
o nvme-fc: remove err_work work item (bsc#1177326).
o nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
o nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
o nvme-fc: track error_recovery while connecting (bsc#1177326).
o nvme-fc: wait for queues to freeze before calling (git-fixes).
o nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
o nvme-multipath: fix deadlock due to head->lock (git-fixes).
o nvme-pci: properly print controller address (git-fixes).
o nvme-rdma: avoid race between time out and tear down (bsc#1179519).
o nvme-rdma: avoid repeated request completion (bsc#1179519).
o nvme-rdma: cancel async events before freeing event struct (git-fixes).
o nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
o nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#
1179519).
o nvme-rdma: fix timeout handler (bsc#1179519).
o nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
o nvme-rdma: serialize controller teardown sequences (bsc#1179519).
o nvme-tcp: avoid race between time out and tear down (bsc#1179519).
o nvme-tcp: avoid repeated request completion (bsc#1179519).
o nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
o nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
o nvme-tcp: cancel async events before freeing event struct (git-fixes).
o nvme-tcp: do not poll a non-live queue (bsc#1179519).
o nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
o nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
o nvme-tcp: fix possible leakage during error flow (git-fixes).
o nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#
1179519).
o nvme-tcp: fix timeout handler (bsc#1179519).
o nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
o nvme-tcp: leverage request plugging (bsc#1179519).
o nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
o nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
o nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
o nvme-tcp: serialize controller teardown sequences (bsc#1179519).
o nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#
1179519).
o nvme-tcp: try to send request in queue_rq context (bsc#1179519).
o nvme-tcp: use bh_lock in data_ready (bsc#1179519).
o nvme: do not protect ns mutation with ns->head->lock (git-fixes).
o nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
o nvme: introduce nvme_sync_io_queues (bsc#1179519).
o nvme: Revert: Fix controller creation races with teardown (git-fixes).
o nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
o nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
o ocfs2: fix unbalanced locking (bsc#1180506).
o orinoco: Move context allocation after processing the skb (git-fixes).
o PCI: brcmstb: Initialize "tmp" before use (git-fixes).
o PCI: Fix overflow in command-line resource alignment requests (git-fixes).
o PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
o PCI: iproc: Fix out-of-bound array accesses (git-fixes).
o pinctrl: amd: remove debounce filter setting in IRQ type setting
(git-fixes).
o pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
o pinctrl: baytrail: Avoid clearing debounce value when turning it off
(git-fixes).
o pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe()
(git-fixes).
o pinctrl: merrifield: Set default bias in case no particular value given
(git-fixes).
o platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
o platform/x86: acer-wmi: add automatic keyboard background light toggle key
as KEY_LIGHTS_TOGGLE (git-fixes).
o platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init
(git-fixes).
o platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12
(git-fixes).
o platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC
(git-fixes).
o platform/x86: mlx-platform: Fix item counter assignment for MSN2700,
MSN24xx systems (git-fixes).
o platform/x86: mlx-platform: remove an unused variable (git-fixes).
o platform/x86: mlx-platform: Remove PSU EEPROM from default platform
configuration (git-fixes).
o platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform
configuration (git-fixes).
o platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad
Yoga 11e 4th gen (git-fixes).
o platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e
(git-fixes).
o platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet
(git-fixes).
o power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching
(git-fixes).
o power: supply: bq24190_charger: fix reference leak (git-fixes).
o powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc
#1065729).
o powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE
(jsc#SLE-9246 git-fixes).
o powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#
1179888 ltc#190253).
o powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666
git-fixes).
o powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117
ltc#159753 git-fixes bsc#1179888 ltc#190253).
o powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753
git-fixes bsc#1179888 ltc#190253).
o powerpc/bitops: Fix possible undefined behaviour with fls() and fls64()
(bsc#1156395).
o powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
o powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#
189002).
o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#
184630).
o powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#
1179578 ltc#189313).
o powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374
ltc#178199 git-fixes).
o powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
o powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067
git-fixes).
o powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
o powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
o powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#
1065729).
o pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
o pwm: zx: Add missing cleanup in error path (git-fixes).
o qede: Notify qedr when mtu has changed (bsc#1152489)
o qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
o quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
o RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#
1152489)
o RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
o RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
o RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#
1152489)
o RDMA/core: Fix reported speed and width (bsc#1152489)
o RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#
1152489)
o RDMA/core: Free DIM memory in error unwind (bsc#1152489)
o RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
o RDMA/counter: Allow manually bind QPs with different pids to same counter
(bsc#1152489)
o RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
o RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
o RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
o RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
o RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
o RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
o RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
o RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work
(bsc#1152489)
o RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
o RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
o RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
o RDMA/qedr: Fix doorbell setting (bsc#1152489)
o RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
o RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
o RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
o RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
o RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
o RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
o RDMA/qedr: SRQ's bug fixes (bsc#1152489)
o RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
o RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
o RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
o RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#
1152489)
o RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
o RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue
(bsc#1152489)
o RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
o RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
o RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
o RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
o RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
o RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page
boundary (bsc#1152489)
o RDMA/umem: Prevent small pages from being returned by
ib_umem_find_best_pgsz() (bsc#1152489)
o Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#
1180117)
o regmap: Remove duplicate `type` field from regmap `regcache_sync` trace
event (git-fixes).
o regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x
(git-fixes).
o regulator: mcp16502: add linear_min_sel (git-fixes).
o reiserfs: Fix oops during mount (bsc#1179715).
o reiserfs: Initialize inode keys properly (bsc#1179713).
o remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
o remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio()
(git-fixes).
o remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
o rsi: fix error return code in rsi_reset_card() (git-fixes).
o rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time
(git-fixes).
o rtc: hym8563: enable wakeup when applicable (git-fixes).
o rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
o s390/cpuinfo: show processor physical address (git-fixes).
o s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
o s390/qeth: delay draining the TX buffers (git-fixes).
o s390/qeth: fix af_iucv notification race (git-fixes).
o s390/qeth: fix tear down of async TX buffers (git-fixes).
o s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#
190151).
o s390: add 3f program exception handler (git-fixes).
o samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
o samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
o sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
o sched/fair: Fix race between runtime distribution and (git-fixes)
o sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
o sched/fair: Refill bandwidth before scaling (git-fixes)
o sched: correct SD_flags returned by tl->sd_flags() (git-fixes)
o scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
o scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#
1171000).
o scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
o scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
o scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
o scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
o scsi: fnic: Validate io_req before others (bsc#1175079).
o scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional
events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi()
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix removal of SCSI transport device get and put on dev
structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix set but not used warnings from Rework remote port lock
handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler()
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix spelling mistake "Cant" -> "Can't" (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix variable 'vport' set but not used in
lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#
1177500).
o scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of
functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc
#1176942 bsc#1177500).
o scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store()
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping
it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target
and LUN (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Get device objects using sas_address & portID (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc
#1177733).
o scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc
#1177733).
o scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc
#1177733).
o scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc
#1177733).
o scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#
1177733).
o scsi: qla2xxx: Change post del message from debug level to log level (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines
(bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry
(bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
o scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942
bsc#1177500).
o scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
o scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#
1172733).
o scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#
1165933, bsc#1171000).
o scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc
#1165933).
o selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
o selftests/bpf/test_offload.py: Reset ethtool features after failed setting
(bsc#1155518).
o selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
o selftests/bpf: Print reason when a tester could not run a program (bsc#
1155518).
o serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
o serial_core: Check for port state when tty is in error state (git-fixes).
o slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI
(git-fixes).
o soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
o soc: amlogic: canvas: add missing put_device() call in meson_canvas_get()
(git-fixes).
o soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
o soc: mediatek: Check if power domains can be powered on at boot time
(git-fixes).
o soc: qcom: geni: More properly switch to DMA mode (git-fixes).
o soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
o soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains()
(git-fixes).
o soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
o soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
o speakup: fix uninitialized flush_lock (git-fixes).
o spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
o spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
o spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in
bcm63xx_hsspi_resume (git-fixes).
o spi: davinci: Fix use-after-free on unbind (git-fixes).
o spi: fix resource leak for drivers without .remove callback (git-fixes).
o spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
o spi: mt7621: Disable clock in probe error path (git-fixes).
o spi: mt7621: fix missing clk_disable_unprepare() on error in
mt7621_spi_probe (git-fixes).
o spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
o spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
o spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
o spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
o spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
o spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
o spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path
(git-fixes).
o spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
o spi: synquacer: Disable clock in probe error path (git-fixes).
o spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
o spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
o spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
o staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
o staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe
() (git-fixes).
o thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
o tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
o tty: Fix ->session locking (bsc#1179745).
o ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#
1179703).
o ubifs: Do not parse authentication mount options in remount process (bsc#
1179688).
o ubifs: Fix a memleak after dumping authentication mount options (bsc#
1179687).
o ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#
1179675).
o ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
o ubifs: mount_ubifs: Release authentication resource in error handling path
(bsc#1179689).
o ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#
1179690).
o udf: Fix memory leak when mounting (bsc#1179712).
o usb/max3421: fix return error code in max3421_probe() (git-fixes).
o usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
o usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul
(git-fixes).
o usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe
(git-fixes).
o usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
o usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
o usb: gadget: f_fs: Use local copy of descriptors for userspace copy
(git-fixes).
o usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
o usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
o usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe()
(git-fixes).
o usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
o usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
o usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO
built-in usb-audio card (git-fixes).
o usb: serial: ch341: add new Product ID for CH341A (git-fixes).
o usb: serial: ch341: sort device-id entries (git-fixes).
o usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
o usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
o usb: serial: keyspan_pda: fix stalled writes (git-fixes).
o usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
o usb: serial: keyspan_pda: fix write deadlock (git-fixes).
o usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
o usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
o usb: serial: kl5kusb105: fix memleak on open (git-fixes).
o usb: serial: mos7720: fix parallel-port state restore (git-fixes).
o usb: serial: option: add Fibocom NL668 variants (git-fixes).
o usb: serial: option: add interface-number sanity check to flag handling
(git-fixes).
o usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
o usb: serial: option: fix Quectel BG96 matching (git-fixes).
o usb: UAS: introduce a quirk to set no_write_same (git-fixes).
o usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
o video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
o video: fbdev: sis: fix null ptr dereference (bsc#1152472)
o watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
o watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
o watchdog: Fix potential dereferencing of null pointer (git-fixes).
o watchdog: qcom: Avoid context switch in restart handler (git-fixes).
o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
o watchdog: sprd: change to use usleep_range() instead of busy loop
(git-fixes).
o watchdog: sprd: check busy bit before new loading rather than after that
(git-fixes).
o watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
o wimax: fix duplicate initializer warning (git-fixes).
o x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
o x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
o x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
o x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
o x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes
bytes (bsc#1152489).
o x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
o x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
o x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
o x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc
#1152489).
o x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
o x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#
1152489).
o x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak
(bsc#1152489).
o x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
o x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc
#1152489).
o x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
o x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
(bsc#1152489).
o xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP
(git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Workstation Extension 15-SP2:
zypper in -t patch SUSE-SLE-Product-WE-15-SP2-2021-117=1
o SUSE Linux Enterprise Module for Live Patching 15-SP2:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2021-117=1
o SUSE Linux Enterprise Module for Legacy Software 15-SP2:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2021-117=1
o SUSE Linux Enterprise Module for Development Tools 15-SP2:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-117=1
o SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-117=1
o SUSE Linux Enterprise High Availability 15-SP2:
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2021-117=1
Package List:
o SUSE Linux Enterprise Workstation Extension 15-SP2 (x86_64):
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
kernel-default-extra-5.3.18-24.46.1
kernel-default-extra-debuginfo-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x
x86_64):
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
kernel-default-livepatch-5.3.18-24.46.1
kernel-default-livepatch-devel-5.3.18-24.46.1
kernel-livepatch-5_3_18-24_46-default-1-5.3.1
kernel-livepatch-5_3_18-24_46-default-debuginfo-1-5.3.1
kernel-livepatch-SLE15-SP2_Update_9-debugsource-1-5.3.1
o SUSE Linux Enterprise Module for Legacy Software 15-SP2 (aarch64 ppc64le
s390x x86_64):
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
reiserfs-kmp-default-5.3.18-24.46.1
reiserfs-kmp-default-debuginfo-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le
s390x x86_64):
kernel-obs-build-5.3.18-24.46.1
kernel-obs-build-debugsource-5.3.18-24.46.1
kernel-syms-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 x86_64):
kernel-preempt-debuginfo-5.3.18-24.46.1
kernel-preempt-debugsource-5.3.18-24.46.1
kernel-preempt-devel-5.3.18-24.46.1
kernel-preempt-devel-debuginfo-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch):
kernel-docs-5.3.18-24.46.1
kernel-source-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
x86_64):
kernel-default-5.3.18-24.46.1
kernel-default-base-5.3.18-24.46.1.9.19.1
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
kernel-default-devel-5.3.18-24.46.1
kernel-default-devel-debuginfo-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 x86_64):
kernel-preempt-5.3.18-24.46.1
kernel-preempt-debuginfo-5.3.18-24.46.1
kernel-preempt-debugsource-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
kernel-devel-5.3.18-24.46.1
kernel-macros-5.3.18-24.46.1
o SUSE Linux Enterprise High Availability 15-SP2 (aarch64 ppc64le s390x
x86_64):
cluster-md-kmp-default-5.3.18-24.46.1
cluster-md-kmp-default-debuginfo-5.3.18-24.46.1
dlm-kmp-default-5.3.18-24.46.1
dlm-kmp-default-debuginfo-5.3.18-24.46.1
gfs2-kmp-default-5.3.18-24.46.1
gfs2-kmp-default-debuginfo-5.3.18-24.46.1
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
ocfs2-kmp-default-5.3.18-24.46.1
ocfs2-kmp-default-debuginfo-5.3.18-24.46.1
References:
o https://www.suse.com/security/cve/CVE-2020-0444.html
o https://www.suse.com/security/cve/CVE-2020-0465.html
o https://www.suse.com/security/cve/CVE-2020-0466.html
o https://www.suse.com/security/cve/CVE-2020-11668.html
o https://www.suse.com/security/cve/CVE-2020-27068.html
o https://www.suse.com/security/cve/CVE-2020-27777.html
o https://www.suse.com/security/cve/CVE-2020-27786.html
o https://www.suse.com/security/cve/CVE-2020-27825.html
o https://www.suse.com/security/cve/CVE-2020-27830.html
o https://www.suse.com/security/cve/CVE-2020-28374.html
o https://www.suse.com/security/cve/CVE-2020-29370.html
o https://www.suse.com/security/cve/CVE-2020-29373.html
o https://www.suse.com/security/cve/CVE-2020-29660.html
o https://www.suse.com/security/cve/CVE-2020-29661.html
o https://www.suse.com/security/cve/CVE-2020-36158.html
o https://bugzilla.suse.com/1040855
o https://bugzilla.suse.com/1044120
o https://bugzilla.suse.com/1044767
o https://bugzilla.suse.com/1055117
o https://bugzilla.suse.com/1065729
o https://bugzilla.suse.com/1094840
o https://bugzilla.suse.com/1109695
o https://bugzilla.suse.com/1115431
o https://bugzilla.suse.com/1138374
o https://bugzilla.suse.com/1139944
o https://bugzilla.suse.com/1149032
o https://bugzilla.suse.com/1152457
o https://bugzilla.suse.com/1152472
o https://bugzilla.suse.com/1152489
o https://bugzilla.suse.com/1155518
o https://bugzilla.suse.com/1156315
o https://bugzilla.suse.com/1156395
o https://bugzilla.suse.com/1158775
o https://bugzilla.suse.com/1161099
o https://bugzilla.suse.com/1163727
o https://bugzilla.suse.com/1165933
o https://bugzilla.suse.com/1167657
o https://bugzilla.suse.com/1168952
o https://bugzilla.suse.com/1171000
o https://bugzilla.suse.com/1171078
o https://bugzilla.suse.com/1171688
o https://bugzilla.suse.com/1172145
o https://bugzilla.suse.com/1172733
o https://bugzilla.suse.com/1174486
o https://bugzilla.suse.com/1175079
o https://bugzilla.suse.com/1175480
o https://bugzilla.suse.com/1175995
o https://bugzilla.suse.com/1176396
o https://bugzilla.suse.com/1176942
o https://bugzilla.suse.com/1176956
o https://bugzilla.suse.com/1177326
o https://bugzilla.suse.com/1177500
o https://bugzilla.suse.com/1177666
o https://bugzilla.suse.com/1177679
o https://bugzilla.suse.com/1177733
o https://bugzilla.suse.com/1178049
o https://bugzilla.suse.com/1178203
o https://bugzilla.suse.com/1178270
o https://bugzilla.suse.com/1178372
o https://bugzilla.suse.com/1178590
o https://bugzilla.suse.com/1178612
o https://bugzilla.suse.com/1178634
o https://bugzilla.suse.com/1178660
o https://bugzilla.suse.com/1178756
o https://bugzilla.suse.com/1178780
o https://bugzilla.suse.com/1179107
o https://bugzilla.suse.com/1179204
o https://bugzilla.suse.com/1179419
o https://bugzilla.suse.com/1179434
o https://bugzilla.suse.com/1179435
o https://bugzilla.suse.com/1179519
o https://bugzilla.suse.com/1179575
o https://bugzilla.suse.com/1179578
o https://bugzilla.suse.com/1179601
o https://bugzilla.suse.com/1179604
o https://bugzilla.suse.com/1179639
o https://bugzilla.suse.com/1179652
o https://bugzilla.suse.com/1179656
o https://bugzilla.suse.com/1179670
o https://bugzilla.suse.com/1179671
o https://bugzilla.suse.com/1179672
o https://bugzilla.suse.com/1179673
o https://bugzilla.suse.com/1179675
o https://bugzilla.suse.com/1179676
o https://bugzilla.suse.com/1179677
o https://bugzilla.suse.com/1179678
o https://bugzilla.suse.com/1179679
o https://bugzilla.suse.com/1179680
o https://bugzilla.suse.com/1179681
o https://bugzilla.suse.com/1179682
o https://bugzilla.suse.com/1179683
o https://bugzilla.suse.com/1179684
o https://bugzilla.suse.com/1179685
o https://bugzilla.suse.com/1179687
o https://bugzilla.suse.com/1179688
o https://bugzilla.suse.com/1179689
o https://bugzilla.suse.com/1179690
o https://bugzilla.suse.com/1179703
o https://bugzilla.suse.com/1179704
o https://bugzilla.suse.com/1179707
o https://bugzilla.suse.com/1179709
o https://bugzilla.suse.com/1179710
o https://bugzilla.suse.com/1179711
o https://bugzilla.suse.com/1179712
o https://bugzilla.suse.com/1179713
o https://bugzilla.suse.com/1179714
o https://bugzilla.suse.com/1179715
o https://bugzilla.suse.com/1179716
o https://bugzilla.suse.com/1179745
o https://bugzilla.suse.com/1179763
o https://bugzilla.suse.com/1179888
o https://bugzilla.suse.com/1179892
o https://bugzilla.suse.com/1179896
o https://bugzilla.suse.com/1179960
o https://bugzilla.suse.com/1179963
o https://bugzilla.suse.com/1180027
o https://bugzilla.suse.com/1180029
o https://bugzilla.suse.com/1180031
o https://bugzilla.suse.com/1180052
o https://bugzilla.suse.com/1180056
o https://bugzilla.suse.com/1180086
o https://bugzilla.suse.com/1180117
o https://bugzilla.suse.com/1180258
o https://bugzilla.suse.com/1180261
o https://bugzilla.suse.com/1180506
o https://bugzilla.suse.com/1180541
o https://bugzilla.suse.com/1180559
o https://bugzilla.suse.com/1180566
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0118-1
Rating: important
References: #1040855 #1044120 #1044767 #1050242 #1050536 #1050545
#1055117 #1056653 #1056657 #1056787 #1064802 #1065729
#1066129 #1094840 #1103990 #1103992 #1104389 #1104393
#1109695 #1109837 #1110096 #1112178 #1112374 #1115431
#1118657 #1129770 #1136460 #1136461 #1138374 #1139944
#1144912 #1152457 #1163727 #1164780 #1171078 #1172145
#1172538 #1172694 #1174784 #1174852 #1176558 #1176559
#1176956 #1178270 #1178372 #1178401 #1178590 #1178634
#1178762 #1179014 #1179015 #1179045 #1179082 #1179107
#1179142 #1179204 #1179419 #1179444 #1179520 #1179578
#1179601 #1179663 #1179666 #1179670 #1179671 #1179672
#1179673 #1179711 #1179713 #1179714 #1179715 #1179716
#1179722 #1179723 #1179724 #1179745 #1179810 #1179888
#1179895 #1179896 #1179960 #1179963 #1180027 #1180029
#1180031 #1180052 #1180086 #1180117 #1180258 #1180506
#1180559
Cross-References: CVE-2018-20669 CVE-2019-20934 CVE-2020-0444 CVE-2020-0465
CVE-2020-0466 CVE-2020-27068 CVE-2020-27777 CVE-2020-27786
CVE-2020-27825 CVE-2020-28374 CVE-2020-29660 CVE-2020-29661
CVE-2020-36158 CVE-2020-4788
Affected Products:
SUSE Linux Enterprise Workstation Extension 15-SP1
SUSE Linux Enterprise Module for Live Patching 15-SP1
SUSE Linux Enterprise Module for Legacy Software 15-SP1
SUSE Linux Enterprise Module for Development Tools 15-SP1
SUSE Linux Enterprise Module for Basesystem 15-SP1
SUSE Linux Enterprise High Availability 15-SP1
______________________________________________________________________________
An update that solves 14 vulnerabilities and has 77 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security
and bugfixes.
The following security bugs were fixed:
o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
o CVE-2020-36158: Fixed a potential remote code execution in the Marvell
mwifiex driver (bsc#1180559).
o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc
#1179960).
o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl
and ep_loop_check_proc of eventpoll.c (bnc#1180031).
o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check
in the nl80211_policy policy of nl80211.c (bnc#1180086).
o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c
that could have led to local privilege escalation (bnc#1180029).
o CVE-2020-0444: Fixed a bad kfree due to a logic error in
audit_data_to_entry (bnc#1180027).
o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may
have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a
use-after-free attack against TIOCSPGRP (bsc#1179745).
o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction
Services (RTAS) interface, affecting guests running on top of PowerVM or
KVM hypervisors (bnc#1179107).
o CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA
fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#
1179663).
o CVE-2020-27786: Fixed a use after free in kernel midi subsystem
snd_rawmidi_kernel_read1() (bsc#1179601).
The following non-security bugs were fixed:
o ACPI: PNP: compare the string length in the matching_id() (git-fixes).
o ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1
(git-fixes).
o ACPICA: Do not increment operation_region reference counts for field units
(git-fixes).
o ALSA: ca0106: fix error code handling (git-fixes).
o ALSA: ctl: allow TLV read operation for callback type of element in locked
case (git-fixes).
o ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO
(git-fixes).
o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
o ALSA: hda/hdmi: always check pin power status in i915 pin fixup
(git-fixes).
o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
o ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged
(git-fixes).
o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255
(git-fixes).
o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model
(git-fixes).
o ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
o ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation
P520 (git-fixes).
o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294
(git-fixes).
o ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table
(git-fixes).
o ALSA: hda: Fix potential race in unsol event handler (git-fixes).
o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
o ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
o ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
o ALSA: line6: Perform sanity check for each URB creation (git-fixes).
o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
o ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
(git-fixes).
o ALSA: timer: Limit max amount of slave instances (git-fixes).
o ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
o ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
o ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
o ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S
(git-fixes).
o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S
(git-fixes).
o ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices
(git-fixes).
o ALSA: usb-audio: Disable sample read check if firmware does not give back
(git-fixes).
o ALSA: usb-audio: Fix control 'access overflow' errors from chmap
(git-fixes).
o ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
o ALSA: usb-audio: Fix race against the error recovery URB submission
(git-fixes).
o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams
(git-fixes).
o ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed
(git-fixes).
o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
o ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
o ASoC: pcm: DRAIN support reactivation (git-fixes).
o ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
o ASoC: sti: fix possible sleep-in-atomic (git-fixes).
o ASoC: wm8904: fix regcache handling (git-fixes).
o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
o ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control()
(git-fixes).
o ata/libata: Fix usage of page address by page_address in
ata_scsi_mode_select_xlat function (git-fixes).
o ath10k: Fix an error handling path (git-fixes).
o ath10k: fix backtrace on coredump (git-fixes).
o ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
o ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq
(git-fixes).
o ath10k: Release some resources in an error handling path (git-fixes).
o ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
o ath6kl: fix enum-conversion warning (git-fixes).
o ath9k_htc: Discard undersized packets (git-fixes).
o ath9k_htc: Modify byte order for an error message (git-fixes).
o ath9k_htc: Silence undersized packet warnings (git-fixes).
o ath9k_htc: Use appropriate rs_datalen type (git-fixes).
o Avoid a GCC warning about "/*" within a comment.
o backlight: lp855x: Ensure regulators are disabled on probe failure
(git-fixes).
o Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
o Bluetooth: btusb: Fix detection of some fake CSR controllers with a
bcdDevice val of 0x0134 (git-fixes).
o Bluetooth: Fix advertising duplicated flags (git-fixes).
o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
(git-fixes).
o bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).
o bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#
1050242).
o btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
o btrfs: fix use-after-free on readahead extent after failure to create it
(bsc#1179963).
o btrfs: qgroup: do not commit transaction when we already hold the handle
(bsc#1178634).
o btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
o can: mcp251x: add error check when wq alloc failed (git-fixes).
o can: softing: softing_netdev_open(): fix error handling (git-fixes).
o cfg80211: initialize rekey_data (git-fixes).
o cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
o cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
o cifs: fix check of tcon dfs in smb1 (bsc#1178270).
o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
o cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
o cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code
(git-fixes).
o clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
o clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
o clk: qcom: msm8916: Fix the address location of pll->config_reg
(git-fixes).
o clk: s2mps11: Fix a resource leak in error handling paths in the probe
function (git-fixes).
o clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
o clk: tegra: Fix duplicated SE clock entry (git-fixes).
o clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
o clk: ti: composite: fix memory leak (git-fixes).
o clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
o clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
o coredump: fix core_pattern parse error (git-fixes).
o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe
(git-fixes).
o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
o crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
o cw1200: fix missing destroy_workqueue() on error in cw1200_init_common
(git-fixes).
o cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#
1066129).
o drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a
driver developer is foolish (git-fixes).
o drivers: soc: ti: knav_qmss_queue: Fix error return code in
knav_queue_probe (git-fixes).
o drm/amd/display: remove useless if/else (git-fixes).
o drm/amdgpu: fix build_coefficients() argument (git-fixes).
o drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor()
(git-fixes).
o drm/gma500: fix double free of gma_connector (git-fixes).
o drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#
1129770)
o drm/meson: dw-hdmi: Register a callback to disable the regulator
(git-fixes).
o drm/msm/dpu: Add newline to printks (git-fixes).
o drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
o drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
o drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
o epoll: Keep a reference on files added to the check list (bsc#1180031).
o ext4: correctly report "not supported" for {usr,grp}jquota when !
CONFIG_QUOTA (bsc#1179672).
o ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
o ext4: fix error handling code in add_new_gdb (bsc#1179722).
o ext4: fix invalid inode checksum (bsc#1179723).
o ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
o ext4: limit entries returned when counting fsmap records (bsc#1179671).
o ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#
1179673).
o extcon: max77693: Fix modalias string (git-fixes).
o fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178)
Backporting changes: * updated path drivers/video/fbcon/core to drivers/
video/console
o fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: *
updated path drivers/video/fbcon/core to drivers/video/console * context
changes
o firmware: qcom: scm: Ensure 'a0' status code is treated as signed
(git-fixes).
o fix regression in "epoll: Keep a reference on files added to the check
list" (bsc#1180031, git-fixes).
o forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
o fs: Do not invalidate page buffers in block_write_full_page() (bsc#
1179711).
o geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
o genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#
1065729).
o gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
o gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in
grgpio_irq_map/unmap() (git-fixes).
o gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
o gpio: max77620: Fixup debounce delays (git-fixes).
o gpio: max77620: Use correct unit for debounce times (git-fixes).
o gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
o gpio: mvebu: fix potential user-after-free on probe (git-fixes).
o gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism
(git-fixes).
o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288
model (git-fixes).
o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288
model (git-fixes).
o gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
o gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option
(git-fixes).
o gpiolib: acpi: Turn dmi_system_id table into a generic quirk table
(git-fixes).
o gpiolib: fix up emulated open drain outputs (git-fixes).
o HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
o HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
o HID: core: check whether Usage Page item is after Usage ID items
(git-fixes).
o HID: core: Correctly handle ReportSize being zero (git-fixes).
o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
o HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
o HID: Improve Windows Precision Touchpad detection (git-fixes).
o HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring()
(git-fixes).
o HID: logitech-hidpp: Silence intermittent get_battery_capacity errors
(git-fixes).
o HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
o hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
o hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
o i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
o i2c: i801: Fix resume bug (git-fixes).
o i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets
(git-fixes).
o i2c: pxa: clear all master action bits in i2c_pxa_stop_message()
(git-fixes).
o i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
o i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
o ibmvnic: add some debugs (bsc#1179896 ltc#190255).
o ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
o ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#
184239 git-fixes).
o ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098
git-fixes).
o ibmvnic: enhance resetting status check during module exit (bsc#1065729).
o ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853
git-fixes).
o ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855
ltc#155067 git-fixes).
o ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
o ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#
155423 git-fixes).
o ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432
git-fixes).
o igc: Fix returning wrong statistics (bsc#1118657).
o iio: adc: max1027: Reset the device at probe time (git-fixes).
o iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in
rockchip_saradc_resume (git-fixes).
o iio: bmp280: fix compensation of humidity (git-fixes).
o iio: buffer: Fix demux update (git-fixes).
o iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw()
(git-fixes).
o iio: fix center temperature of bmc150-accel-core (git-fixes).
o iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting
(git-fixes).
o iio: light: bh1750: Resolve compiler warning and make code more readable
(git-fixes).
o iio: srf04: fix wrong limitation in distance measuring (git-fixes).
o iio:imu:bmi160: Fix too large a buffer (git-fixes).
o iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
o inet_ecn: Fix endianness of checksum update when setting ECT(1)
(git-fixes).
o Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
o Input: ads7846 - fix race that causes missing releases (git-fixes).
o Input: ads7846 - fix unaligned access on 7845 (git-fixes).
o Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
o Input: cm109 - do not stomp on control URB (git-fixes).
o Input: cros_ec_keyb - send 'scancodes' in addition to key events
(git-fixes).
o Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet
(git-fixes).
o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
o Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
o Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists
(git-fixes).
o Input: i8042 - allow insmod to succeed on devices without an i8042
controller (git-fixes).
o Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
o Input: omap4-keypad - fix runtime PM error handling (git-fixes).
o Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
o Input: trackpoint - add new trackpoint variant IDs (git-fixes).
o Input: trackpoint - enable Synaptics trackpoints (git-fixes).
o Input: xpad - support Ardwiino Controllers (git-fixes).
o ipw2x00: Fix -Wcast-function-type (git-fixes).
o irqchip/alpine-msi: Fix freeing of interrupts on allocation error path
(git-fixes).
o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
o iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
o iwlwifi: pcie: limit memory read spin time (git-fixes).
o kABI fix for g2d (git-fixes).
o kABI workaround for dsa/b53 changes (git-fixes).
o kABI workaround for HD-audio generic parser (git-fixes).
o kABI workaround for net/ipvlan changes (git-fixes).
o kABI: ath10k: move a new structure member to the end (git-fixes).
o kABI: genirq: add back irq_create_mapping (bsc#1065729).
o kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT
is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
o kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
o kgdb: Fix spurious true from in_dbg_master() (git-fixes).
o KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#
1112178).
o mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
o mac80211: Check port authorization in the ieee80211_tx_dequeue() case
(git-fixes).
o mac80211: do not set set TDLS STA bandwidth wider than possible
(git-fixes).
o mac80211: fix authentication with iwlwifi/mvm (git-fixes).
o mac80211: fix use of skb payload instead of header (git-fixes).
o mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
o matroxfb: avoid -Warray-bounds warning (git-fixes).
o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#
1163727).
o md-cluster: fix safemode_delay value when converting to clustered bitmap
(bsc#1163727).
o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
o md/cluster: block reshape with remote resync job (bsc#1163727).
o md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
o md/raid5: fix oops during stripe resizing (git-fixes).
o media: am437x-vpfe: Setting STD to current value is not an error
(git-fixes).
o media: cec-funcs.h: add status_req checks (git-fixes).
o media: cx88: Fix some error handling path in 'cx8800_initdev()'
(git-fixes).
o media: gspca: Fix memory leak in probe (git-fixes).
o media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
o media: i2c: ov2659: Fix missing 720p register config (git-fixes).
o media: i2c: ov2659: fix s_stream return value (git-fixes).
o media: msi2500: assign SPI bus number dynamically (git-fixes).
o media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
o media: mtk-vcodec: add missing put_device() call in
mtk_vcodec_release_dec_pm() (git-fixes).
o media: platform: add missing put_device() call in mtk_jpeg_probe() and
mtk_jpeg_remove() (git-patches).
o media: pvrusb2: Fix oops on tear-down when radio support is not present
(git-fixes).
o media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()
' (git-fixes).
o media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
o media: si470x-i2c: add missed operations in remove (git-fixes).
o media: siano: fix memory leak of debugfs members in smsdvb_hotplug
(git-fixes).
o media: solo6x10: fix missing snd_card_free in error handling case
(git-fixes).
o media: sti: bdisp: fix a possible sleep-in-atomic-context bug in
bdisp_device_run() (git-fixes).
o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
o media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases
(git-fixes).
o media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence
number (git-fixes).
o media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage
(git-fixes).
o media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic
(git-fixes).
o media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel
format (git-fixes).
o media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
o media: uvcvideo: Set media controller entity functions (git-fixes).
o media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
o media: v4l2-async: Fix trivial documentation typo (git-fixes).
o media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
o media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in
v4l2_device macros (git-fixes).
o mei: bus: do not clean driver pointer (git-fixes).
o mei: protect mei_cl_mtu from null dereference (git-fixes).
o memstick: fix a double-free bug in memstick_check (git-fixes).
o memstick: r592: Fix error return in r592_probe() (git-fixes).
o mfd: rt5033: Fix errorneous defines (git-fixes).
o mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
o mlxsw: core: Fix memory leak on module removal (bsc#1112374).
o mm,memory_failure: always pin the page in madvise_inject_error (bsc#
1180258).
o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault()
(bsc#1179204).
o mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
o net/smc: fix valid DMBE buffer sizes (git-fixes).
o net/tls: Fix kmap usage (bsc#1109837).
o net/tls: missing received data after fast remote close (bsc#1109837).
o net/x25: prevent a couple of overflows (bsc#1178590).
o net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
o net: aquantia: fix LRO with FCS error (git-fixes).
o net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).
o net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan()
(git-fixes).
o net: dsa: b53: Ensure the default VID is untagged (git-fixes).
o net: dsa: b53: Fix default VLAN ID (git-fixes).
o net: dsa: b53: Properly account for VLAN filtering (git-fixes).
o net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
o net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend()
(git-fixes).
o net: dsa: qca8k: remove leftover phy accessors (git-fixes).
o net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
o net: ena: handle bad request id in ena_netdev (git-fixes).
o net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
o net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
o net: macb: add missing barriers when reading descriptors (git-fixes).
o net: macb: fix dropped RX frames due to a race (git-fixes).
o net: macb: fix error format in dev_err() (git-fixes).
o net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).
o net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
o net: phy: Avoid multiple suspends (git-fixes).
o net: qed: fix "maybe uninitialized" warning (bsc#1136460 jsc#SLE-4691 bsc#
1136461 jsc#SLE-4692).
o net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#
1104389).
o net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc
#1136461 jsc#SLE-4692).
o net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc
#SLE-4691 bsc#1136461 jsc#SLE-4692).
o net: seeq: Fix the function used to release some memory in an error
handling path (git-fixes).
o net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
o net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
o net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
o net: stmmac: fix csr_clk can't be zero issue (git-fixes).
o net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
o net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).
o net: usb: sr9800: fix uninitialized local variable (git-fixes).
o net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
o net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#
1056787).
o nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
o nfc: s3fwrn5: Release the nfc firmware (git-fixes).
o nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
o nfp: use correct define to return NONE fec (bsc#1109837).
o NFS: fix nfs_path in case of a rename retry (git-fixes).
o NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
o NFSv4.2: fix client's attribute cache management for copy_file_range
(git-fixes).
o NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag
(git-fixes).
o ocfs2: fix unbalanced locking (bsc#1180506).
o ocfs2: initialize ip_next_orphan (bsc#1179724).
o orinoco: Move context allocation after processing the skb (git-fixes).
o parport: load lowlevel driver if ports not found (git-fixes).
o PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
o PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge
(git-fixes).
o PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
o PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
o phy: Revert toggling reset changes (git-fixes).
o pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
o pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
o pinctrl: amd: remove debounce filter setting in IRQ type setting
(git-fixes).
o pinctrl: baytrail: Avoid clearing debounce value when turning it off
(git-fixes).
o pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe()
(git-fixes).
o pinctrl: merrifield: Set default bias in case no particular value given
(git-fixes).
o pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
o platform/x86: acer-wmi: add automatic keyboard background light toggle key
as KEY_LIGHTS_TOGGLE (git-fixes).
o platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init
(git-fixes).
o platform/x86: mlx-platform: Fix item counter assignment for MSN2700,
MSN24xx systems (git-fixes).
o platform/x86: mlx-platform: remove an unused variable (git-fixes).
o platform/x86: mlx-platform: Remove PSU EEPROM from default platform
configuration (git-fixes).
o platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform
configuration (git-fixes).
o PM / hibernate: memory_bm_find_bit(): Tighten node optimisation
(git-fixes).
o PM: ACPI: Output correct message on target power state (git-fixes).
o PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
o PM: hibernate: remove the bogus call to get_gendisk() in software_resume()
(git-fixes).
o pNFS/flexfiles: Fix list corruption if the mirror count changes
(git-fixes).
o power: supply: bq24190_charger: fix reference leak (git-fixes).
o power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
o powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc
#1065729).
o powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#
1179888 ltc#190253).
o powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117
ltc#159753 git-fixes bsc#1179888 ltc#190253).
o powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
o powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#
184630).
o powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#
184630).
o powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#
1179578 ltc#189313).
o powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374
ltc#178199 git-fixes).
o powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
o powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067
git-fixes).
o powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
o powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#
184630).
o powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#
1065729).
o ppp: remove the PPPIOCDETACH ioctl (git-fixes).
o pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
o qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#
1050545).
o qed: suppress "do not support RoCE & iWARP" flooding on HW init (bsc#
1050536 bsc#1050545).
o qed: suppress false-positives interrupt error messages on HW init (bsc#
1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
o quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
o radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
o ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
o RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#
1050545).
o RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).
o regmap: debugfs: check count when read regmap file (git-fixes).
o regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
o regmap: Remove duplicate `type` field from regmap `regcache_sync` trace
event (git-fixes).
o regulator: max8907: Fix the usage of uninitialized variable in
max8907_regulator_probe() (git-fixes).
o regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe()
could be uninitialized (git-fixes).
o regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/
ti_abb_clear_all_txdone (git-fixes).
o reiserfs: Fix oops during mount (bsc#1179715).
o reiserfs: Initialize inode keys properly (bsc#1179713).
o remoteproc: Fix wrong rvring index computation (git-fixes).
o rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
o rtc: 88pm860x: fix possible race condition (git-fixes).
o rtc: hym8563: enable wakeup when applicable (git-fixes).
o rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot
(git-fixes).
o rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
o s390/bpf: Fix multiple tail calls (git-fixes).
o s390/cpuinfo: show processor physical address (git-fixes).
o s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
o s390/dasd: fix hanging device offline processing (bsc#1144912).
o s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
o s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
o s390/qeth: fix af_iucv notification race (git-fixes).
o s390/qeth: fix tear down of async TX buffers (git-fixes).
o s390/qeth: make af_iucv TX notification call more robust (git-fixes).
o s390/stp: add locking to sysfs functions (git-fixes).
o s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).
o scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
o scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
o scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#
1164780).
o scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#
1164780).
o scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#
1164780).
o scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
o scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#
1164780).
o scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#
1164780).
o scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#
1164780).
o scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
o scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional
events (bsc#1164780).
o scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
o scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
o scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#
1164780).
o scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#
1164780).
o scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
o scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#
1164780).
o scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi()
(bsc#1164780).
o scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
o scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
o scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#
1164780).
o scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#
1164780).
o scsi: lpfc: Fix removal of SCSI transport device get and put on dev
structure (bsc#1164780).
o scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi
(bsc#1164780).
o scsi: lpfc: Fix set but not used warnings from Rework remote port lock
handling (bsc#1164780).
o scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler()
(bsc#1164780).
o scsi: lpfc: Fix spelling mistake "Cant" -> "Can't" (bsc#1164780).
o scsi: lpfc: Fix variable 'vport' set but not used in
lpfc_sli4_abts_err_handler() (bsc#1164780).
o scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions
(bsc#1164780).
o scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#
1164780).
o scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues
(bsc#1164780).
o scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
o scsi: lpfc: Refactor WQE structure definitions for common use (bsc#
1164780).
o scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
o scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
o scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails
(bsc#1164780).
o scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
o scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store()
(bsc#1164780).
o scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
o scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
o scsi: lpfc: Rework remote port lock handling (bsc#1164780).
o scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
o scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping
it (bsc#1164780).
o scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
o scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
o scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
o scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
o scsi: lpfc: Use generic power management (bsc#1164780).
o scsi: qla2xxx: Change post del message from debug level to log level (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#
1179810).
o scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines
(bsc#1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry
(bsc#1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#
1179810).
o scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538
bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc
#1179810).
o scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#
1179810).
o scsi: Remove unneeded break statements (bsc#1164780).
o scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
o scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#
1179142 bsc#1179810).
o serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
o serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
o serial: amba-pl011: Make sure we initialize the port.lock spinlock
(git-fixes).
o serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
o serial: txx9: add missing platform_driver_unregister() on error in
serial_txx9_init (git-fixes).
o serial_core: Check for port state when tty is in error state (git-fixes).
o SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
o SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
o SMB3: Honor lease disabling for multiuser mounts (git-fixes).
o soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
o soc: imx: gpc: fix power up sequencing (git-fixes).
o soc: mediatek: Check if power domains can be powered on at boot time
(git-fixes).
o soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
o soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
o soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
o spi: Add call to spi_slave_abort() function when spidev driver is released
(git-fixes).
o spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in
bcm63xx_hsspi_resume (git-fixes).
o spi: davinci: Fix use-after-free on unbind (git-fixes).
o spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
o spi: dw: Fix Rx-only DMA transfers (git-fixes).
o spi: dw: Return any value retrieved from the dma_transfer callback
(git-fixes).
o spi: Fix memory leak on splited transfers (git-fixes).
o spi: img-spfi: fix potential double release (git-fixes).
o spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
o spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
o spi: pxa2xx: Add missed security checks (git-fixes).
o spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
o spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
o spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
o spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
o spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
o spi: spidev: fix a potential use-after-free in spidev_release()
(git-fixes).
o spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path
(git-fixes).
o spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
o spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
o spi: tegra20-slink: add missed clk_unprepare (git-fixes).
o spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
o splice: only read in as much information as there is pipe buffer space (bsc
#1179520).
o staging: comedi: check validity of wMaxPacketSize of usb endpoints found
(git-fixes).
o staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value
(git-fixes).
o staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
o staging: olpc_dcon: add a missing dependency (git-fixes).
o staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe
() (git-fixes).
o staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21
(git-fixes).
o staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
o staging: rtl8188eu: fix possible null dereference (git-fixes).
o staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
o staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
o staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb()
(git-fixes).
o staging: wlan-ng: properly check endpoint types (git-fixes).
o sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#
1103992).
o sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
o sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment()
(git-fixes).
o sunrpc: The RDMA back channel mustn't disappear while requests are
outstanding (git-fixes).
o svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#
1103992).
o svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).
o tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#
1109837).
o thunderbolt: Use 32-bit writes when writing ring producer/consumer
(git-fixes).
o timer: Fix wheel index calculation on last level (git fixes)
o timer: Prevent base->clk from moving backward (git-fixes)
o tty: always relink the port (git-fixes).
o tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
o tty: link tty and port before configuring it as console (git-fixes).
o tty: synclink_gt: Adjust indentation in several functions (git-fixes).
o tty: synclinkmp: Adjust indentation in several functions (git-fixes).
o tty:serial:mvebu-uart:fix a wrong return (git-fixes).
o uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
o uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
o usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
o usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul
(git-fixes).
o usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
o usb: dwc2: Fix IN FIFO allocation (git-fixes).
o usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
o usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe
(git-fixes).
o usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
o usb: fsl: Check memory resource before releasing it (git-fixes).
o usb: gadget: composite: Fix possible double free memory bug (git-fixes).
o usb: gadget: configfs: fix concurrent issue between composite APIs
(git-fixes).
o usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
o usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
o usb: gadget: f_fs: Use local copy of descriptors for userspace copy
(git-fixes).
o usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
o usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
o usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
o usb: gadget: fix wrong endpoint desc (git-fixes).
o usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
o usb: gadget: net2280: fix memory leak on probe error handling paths
(git-fixes).
o usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
o usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe()
(git-fixes).
o usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init
() (git-fixes).
o usb: hso: Fix debug compile warning on sparc32 (git-fixes).
o usb: ldusb: use unsigned size format specifiers (git-fixes).
o usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue
(git-fixes).
o usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
o usb: serial: ch341: add new Product ID for CH341A (git-fixes).
o usb: serial: ch341: sort device-id entries (git-fixes).
o usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).
o usb: serial: digi_acceleport: clean up set_termios (git-fixes).
o usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
o usb: serial: digi_acceleport: remove in_interrupt() usage.
o usb: serial: digi_acceleport: remove redundant assignment to pointer priv
(git-fixes).
o usb: serial: digi_acceleport: rename tty flag variable (git-fixes).
o usb: serial: digi_acceleport: use irqsave() in USB's complete callback
(git-fixes).
o usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
o usb: serial: keyspan_pda: fix stalled writes (git-fixes).
o usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
o usb: serial: keyspan_pda: fix write deadlock (git-fixes).
o usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
o usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
o usb: serial: kl5kusb105: fix memleak on open (git-fixes).
o usb: serial: mos7720: fix parallel-port state restore (git-fixes).
o usb: serial: option: add Fibocom NL668 variants (git-fixes).
o usb: serial: option: add interface-number sanity check to flag handling
(git-fixes).
o usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
o usb: serial: option: fix Quectel BG96 matching (git-fixes).
o usb: Skip endpoints with 0 maxpacket length (git-fixes).
o usb: UAS: introduce a quirk to set no_write_same (git-fixes).
o usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
o usblp: poison URBs upon disconnect (git-fixes).
o usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
o video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
o vt: do not hardcode the mem allocation upper bound (git-fixes).
o vt: Reject zero-sized screen buffer size (git-fixes).
o watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
o watchdog: da9062: do not ping the hw during stop() (git-fixes).
o watchdog: da9062: No need to ping manually before setting timeout
(git-fixes).
o watchdog: qcom: Avoid context switch in restart handler (git-fixes).
o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
o wimax: fix duplicate initializer warning (git-fixes).
o wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
o wireless: Use offsetof instead of custom macro (git-fixes).
o x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#
1112178).
o x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes
bytes (bsc#1112178).
o x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
o x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
o x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc
#1112178).
o x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#
1112178).
o x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak
(bsc#1112178).
o x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
o x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc
#1112178).
o x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
o x86/traps: Simplify pagefault tracing logic (bsc#1179895).
o x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
(bsc#1112178).
o xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
o xprtrdma: fix incorrect header size calculations (git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Workstation Extension 15-SP1:
zypper in -t patch SUSE-SLE-Product-WE-15-SP1-2021-118=1
o SUSE Linux Enterprise Module for Live Patching 15-SP1:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2021-118=1
o SUSE Linux Enterprise Module for Legacy Software 15-SP1:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2021-118=1
o SUSE Linux Enterprise Module for Development Tools 15-SP1:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP1-2021-118=1
o SUSE Linux Enterprise Module for Basesystem 15-SP1:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2021-118=1
o SUSE Linux Enterprise High Availability 15-SP1:
zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2021-118=1
Package List:
o SUSE Linux Enterprise Workstation Extension 15-SP1 (x86_64):
kernel-default-debuginfo-4.12.14-197.78.1
kernel-default-debugsource-4.12.14-197.78.1
kernel-default-extra-4.12.14-197.78.1
kernel-default-extra-debuginfo-4.12.14-197.78.1
o SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64):
kernel-default-debuginfo-4.12.14-197.78.1
kernel-default-debugsource-4.12.14-197.78.1
kernel-default-livepatch-4.12.14-197.78.1
kernel-default-livepatch-devel-4.12.14-197.78.1
kernel-livepatch-4_12_14-197_78-default-1-3.3.1
o SUSE Linux Enterprise Module for Legacy Software 15-SP1 (aarch64 ppc64le
s390x x86_64):
kernel-default-debuginfo-4.12.14-197.78.1
kernel-default-debugsource-4.12.14-197.78.1
reiserfs-kmp-default-4.12.14-197.78.1
reiserfs-kmp-default-debuginfo-4.12.14-197.78.1
o SUSE Linux Enterprise Module for Development Tools 15-SP1 (aarch64 ppc64le
s390x x86_64):
kernel-obs-build-4.12.14-197.78.1
kernel-obs-build-debugsource-4.12.14-197.78.1
kernel-syms-4.12.14-197.78.1
o SUSE Linux Enterprise Module for Development Tools 15-SP1 (noarch):
kernel-docs-4.12.14-197.78.1
kernel-source-4.12.14-197.78.1
o SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x
x86_64):
kernel-default-4.12.14-197.78.1
kernel-default-base-4.12.14-197.78.1
kernel-default-base-debuginfo-4.12.14-197.78.1
kernel-default-debuginfo-4.12.14-197.78.1
kernel-default-debugsource-4.12.14-197.78.1
kernel-default-devel-4.12.14-197.78.1
kernel-default-devel-debuginfo-4.12.14-197.78.1
o SUSE Linux Enterprise Module for Basesystem 15-SP1 (noarch):
kernel-devel-4.12.14-197.78.1
kernel-macros-4.12.14-197.78.1
o SUSE Linux Enterprise Module for Basesystem 15-SP1 (s390x):
kernel-default-man-4.12.14-197.78.1
kernel-zfcpdump-debuginfo-4.12.14-197.78.1
kernel-zfcpdump-debugsource-4.12.14-197.78.1
o SUSE Linux Enterprise High Availability 15-SP1 (aarch64 ppc64le s390x
x86_64):
cluster-md-kmp-default-4.12.14-197.78.1
cluster-md-kmp-default-debuginfo-4.12.14-197.78.1
dlm-kmp-default-4.12.14-197.78.1
dlm-kmp-default-debuginfo-4.12.14-197.78.1
gfs2-kmp-default-4.12.14-197.78.1
gfs2-kmp-default-debuginfo-4.12.14-197.78.1
kernel-default-debuginfo-4.12.14-197.78.1
kernel-default-debugsource-4.12.14-197.78.1
ocfs2-kmp-default-4.12.14-197.78.1
ocfs2-kmp-default-debuginfo-4.12.14-197.78.1
References:
o https://www.suse.com/security/cve/CVE-2018-20669.html
o https://www.suse.com/security/cve/CVE-2019-20934.html
o https://www.suse.com/security/cve/CVE-2020-0444.html
o https://www.suse.com/security/cve/CVE-2020-0465.html
o https://www.suse.com/security/cve/CVE-2020-0466.html
o https://www.suse.com/security/cve/CVE-2020-27068.html
o https://www.suse.com/security/cve/CVE-2020-27777.html
o https://www.suse.com/security/cve/CVE-2020-27786.html
o https://www.suse.com/security/cve/CVE-2020-27825.html
o https://www.suse.com/security/cve/CVE-2020-28374.html
o https://www.suse.com/security/cve/CVE-2020-29660.html
o https://www.suse.com/security/cve/CVE-2020-29661.html
o https://www.suse.com/security/cve/CVE-2020-36158.html
o https://www.suse.com/security/cve/CVE-2020-4788.html
o https://bugzilla.suse.com/1040855
o https://bugzilla.suse.com/1044120
o https://bugzilla.suse.com/1044767
o https://bugzilla.suse.com/1050242
o https://bugzilla.suse.com/1050536
o https://bugzilla.suse.com/1050545
o https://bugzilla.suse.com/1055117
o https://bugzilla.suse.com/1056653
o https://bugzilla.suse.com/1056657
o https://bugzilla.suse.com/1056787
o https://bugzilla.suse.com/1064802
o https://bugzilla.suse.com/1065729
o https://bugzilla.suse.com/1066129
o https://bugzilla.suse.com/1094840
o https://bugzilla.suse.com/1103990
o https://bugzilla.suse.com/1103992
o https://bugzilla.suse.com/1104389
o https://bugzilla.suse.com/1104393
o https://bugzilla.suse.com/1109695
o https://bugzilla.suse.com/1109837
o https://bugzilla.suse.com/1110096
o https://bugzilla.suse.com/1112178
o https://bugzilla.suse.com/1112374
o https://bugzilla.suse.com/1115431
o https://bugzilla.suse.com/1118657
o https://bugzilla.suse.com/1129770
o https://bugzilla.suse.com/1136460
o https://bugzilla.suse.com/1136461
o https://bugzilla.suse.com/1138374
o https://bugzilla.suse.com/1139944
o https://bugzilla.suse.com/1144912
o https://bugzilla.suse.com/1152457
o https://bugzilla.suse.com/1163727
o https://bugzilla.suse.com/1164780
o https://bugzilla.suse.com/1171078
o https://bugzilla.suse.com/1172145
o https://bugzilla.suse.com/1172538
o https://bugzilla.suse.com/1172694
o https://bugzilla.suse.com/1174784
o https://bugzilla.suse.com/1174852
o https://bugzilla.suse.com/1176558
o https://bugzilla.suse.com/1176559
o https://bugzilla.suse.com/1176956
o https://bugzilla.suse.com/1178270
o https://bugzilla.suse.com/1178372
o https://bugzilla.suse.com/1178401
o https://bugzilla.suse.com/1178590
o https://bugzilla.suse.com/1178634
o https://bugzilla.suse.com/1178762
o https://bugzilla.suse.com/1179014
o https://bugzilla.suse.com/1179015
o https://bugzilla.suse.com/1179045
o https://bugzilla.suse.com/1179082
o https://bugzilla.suse.com/1179107
o https://bugzilla.suse.com/1179142
o https://bugzilla.suse.com/1179204
o https://bugzilla.suse.com/1179419
o https://bugzilla.suse.com/1179444
o https://bugzilla.suse.com/1179520
o https://bugzilla.suse.com/1179578
o https://bugzilla.suse.com/1179601
o https://bugzilla.suse.com/1179663
o https://bugzilla.suse.com/1179666
o https://bugzilla.suse.com/1179670
o https://bugzilla.suse.com/1179671
o https://bugzilla.suse.com/1179672
o https://bugzilla.suse.com/1179673
o https://bugzilla.suse.com/1179711
o https://bugzilla.suse.com/1179713
o https://bugzilla.suse.com/1179714
o https://bugzilla.suse.com/1179715
o https://bugzilla.suse.com/1179716
o https://bugzilla.suse.com/1179722
o https://bugzilla.suse.com/1179723
o https://bugzilla.suse.com/1179724
o https://bugzilla.suse.com/1179745
o https://bugzilla.suse.com/1179810
o https://bugzilla.suse.com/1179888
o https://bugzilla.suse.com/1179895
o https://bugzilla.suse.com/1179896
o https://bugzilla.suse.com/1179960
o https://bugzilla.suse.com/1179963
o https://bugzilla.suse.com/1180027
o https://bugzilla.suse.com/1180029
o https://bugzilla.suse.com/1180031
o https://bugzilla.suse.com/1180052
o https://bugzilla.suse.com/1180086
o https://bugzilla.suse.com/1180117
o https://bugzilla.suse.com/1180258
o https://bugzilla.suse.com/1180506
o https://bugzilla.suse.com/1180559
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0133-1
Rating: important
References: #1040855 #1044120 #1044767 #1050242 #1050536 #1050545
#1055117 #1056653 #1056657 #1056787 #1064802 #1065729
#1066129 #1094840 #1103990 #1103992 #1104389 #1104393
#1109695 #1109837 #1110096 #1112178 #1112374 #1114648
#1115431 #1118657 #1122971 #1129770 #1136460 #1136461
#1138374 #1139944 #1144912 #1152457 #1163727 #1164780
#1171078 #1172145 #1172538 #1172694 #1174784 #1174852
#1176558 #1176559 #1176956 #1177666 #1178270 #1178372
#1178401 #1178590 #1178634 #1178762 #1179014 #1179015
#1179045 #1179082 #1179107 #1179142 #1179204 #1179403
#1179406 #1179418 #1179419 #1179421 #1179444 #1179520
#1179578 #1179601 #1179616 #1179663 #1179666 #1179670
#1179671 #1179672 #1179673 #1179711 #1179713 #1179714
#1179715 #1179716 #1179722 #1179723 #1179724 #1179745
#1179810 #1179888 #1179895 #1179896 #1179960 #1179963
#1180027 #1180029 #1180031 #1180052 #1180086 #1180117
#1180258 #1180506 #1180559
Cross-References: CVE-2018-20669 CVE-2019-20934 CVE-2020-0444 CVE-2020-0465
CVE-2020-0466 CVE-2020-27068 CVE-2020-27777 CVE-2020-27786
CVE-2020-27825 CVE-2020-28374 CVE-2020-29660 CVE-2020-29661
CVE-2020-36158 CVE-2020-4788
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Live Patching 12-SP5
SUSE Linux Enterprise High Availability 12-SP5
______________________________________________________________________________
An update that solves 14 vulnerabilities and has 85 fixes is now available.
Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
and bugfixes.
The following security bugs were fixed:
o CVE-2020-28374: Fixed a LIO security issue (bsc#1178372).
o CVE-2020-36158: Fixed a potential remote code execution in the Marvell
mwifiex driver (bsc#1180559).
o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc
#1179960).
o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl
and ep_loop_check_proc of eventpoll.c (bnc#1180031).
o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check
in the nl80211_policy policy of nl80211.c (bnc#1180086).
o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c
that could have led to local privilege escalation (bnc#1180029).
o CVE-2020-0444: Fixed a bad kfree due to a logic error in
audit_data_to_entry (bnc#1180027).
o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may
have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a
use-after-free attack against TIOCSPGRP (bsc#1179745).
o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction
Services (RTAS) interface, affecting guests running on top of PowerVM or
KVM hypervisors (bnc#1179107).
o CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA
fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#
1179663).
o CVE-2020-27786: Fixed a use after free in kernel midi subsystem
snd_rawmidi_kernel_read1() (bsc#1179601).
o CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed
a local user to obtain sensitive information from the data in the L1 cache
under extenuating circumstances (bsc#1177666).
o CVE-2018-20669: Fixed an improper check i915_gem_execbuffer2_ioctl in
drivers/gpu/drm/i915/i915_gem_execbuffer.c (bsc#1122971).
The following non-security bugs were fixed:
o ACPI: PNP: compare the string length in the matching_id() (git-fixes).
o ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1
(git-fixes).
o ACPICA: Do not increment operation_region reference counts for field units
(git-fixes).
o ALSA: ca0106: fix error code handling (git-fixes).
o ALSA: ctl: allow TLV read operation for callback type of element in locked
case (git-fixes).
o ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO
(git-fixes).
o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
o ALSA: hda/hdmi: always check pin power status in i915 pin fixup
(git-fixes).
o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
o ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged
(git-fixes).
o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255
(git-fixes).
o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model
(git-fixes).
o ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
o ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation
P520 (git-fixes).
o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294
(git-fixes).
o ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table
(git-fixes).
o ALSA: hda: Fix potential race in unsol event handler (git-fixes).
o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
o ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
o ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
o ALSA: line6: Perform sanity check for each URB creation (git-fixes).
o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
o ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
(git-fixes).
o ALSA: timer: Limit max amount of slave instances (git-fixes).
o ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
o ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
o ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
o ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S
(git-fixes).
o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S
(git-fixes).
o ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices
(git-fixes).
o ALSA: usb-audio: Disable sample read check if firmware does not give back
(git-fixes).
o ALSA: usb-audio: Fix control 'access overflow' errors from chmap
(git-fixes).
o ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
o ALSA: usb-audio: Fix race against the error recovery URB submission
(git-fixes).
o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams
(git-fixes).
o ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed
(git-fixes).
o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
o ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
o ASoC: pcm: DRAIN support reactivation (git-fixes).
o ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
o ASoC: sti: fix possible sleep-in-atomic (git-fixes).
o ASoC: wm8904: fix regcache handling (git-fixes).
o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
o ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control()
(git-fixes).
o ata/libata: Fix usage of page address by page_address in
ata_scsi_mode_select_xlat function (git-fixes).
o ath10k: Fix an error handling path (git-fixes).
o ath10k: fix backtrace on coredump (git-fixes).
o ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
o ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq
(git-fixes).
o ath10k: Release some resources in an error handling path (git-fixes).
o ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
o ath6kl: fix enum-conversion warning (git-fixes).
o ath9k_htc: Discard undersized packets (git-fixes).
o ath9k_htc: Modify byte order for an error message (git-fixes).
o ath9k_htc: Silence undersized packet warnings (git-fixes).
o ath9k_htc: Use appropriate rs_datalen type (git-fixes).
o Avoid a GCC warning about "/*" within a comment.
o backlight: lp855x: Ensure regulators are disabled on probe failure
(git-fixes).
o Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
o Bluetooth: btusb: Fix detection of some fake CSR controllers with a
bcdDevice val of 0x0134 (git-fixes).
o Bluetooth: Fix advertising duplicated flags (git-fixes).
o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
(git-fixes).
o bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).
o bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#
1050242).
o btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
o btrfs: fix use-after-free on readahead extent after failure to create it
(bsc#1179963).
o btrfs: qgroup: do not commit transaction when we already hold the handle
(bsc#1178634).
o btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
o can: mcp251x: add error check when wq alloc failed (git-fixes).
o can: softing: softing_netdev_open(): fix error handling (git-fixes).
o cfg80211: initialize rekey_data (git-fixes).
o cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
o cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
o cifs: fix check of tcon dfs in smb1 (bsc#1178270).
o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
o cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
o cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code
(git-fixes).
o clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
o clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
o clk: qcom: msm8916: Fix the address location of pll->config_reg
(git-fixes).
o clk: s2mps11: Fix a resource leak in error handling paths in the probe
function (git-fixes).
o clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
o clk: tegra: Fix duplicated SE clock entry (git-fixes).
o clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
o clk: ti: composite: fix memory leak (git-fixes).
o clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
o clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
o coredump: fix core_pattern parse error (git-fixes).
o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe
(git-fixes).
o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
o crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
o cw1200: fix missing destroy_workqueue() on error in cw1200_init_common
(git-fixes).
o cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#
1066129).
o drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a
driver developer is foolish (git-fixes).
o drivers: soc: ti: knav_qmss_queue: Fix error return code in
knav_queue_probe (git-fixes).
o drm/amd/display: remove useless if/else (git-fixes).
o drm/amdgpu: fix build_coefficients() argument (git-fixes).
o drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor()
(git-fixes).
o drm/gma500: fix double free of gma_connector (git-fixes).
o drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#
1129770)
o drm/meson: dw-hdmi: Register a callback to disable the regulator
(git-fixes).
o drm/msm/dpu: Add newline to printks (git-fixes).
o drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
o drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
o drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
o EDAC/i10nm: Use readl() to access MMIO registers (12sp5).
o epoll: Keep a reference on files added to the check list (bsc#1180031).
o ext4: correctly report "not supported" for {usr,grp}jquota when !
CONFIG_QUOTA (bsc#1179672).
o ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
o ext4: fix error handling code in add_new_gdb (bsc#1179722).
o ext4: fix invalid inode checksum (bsc#1179723).
o ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
o ext4: limit entries returned when counting fsmap records (bsc#1179671).
o ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#
1179673).
o extcon: max77693: Fix modalias string (git-fixes).
o fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178)
Backporting changes: * updated path drivers/video/fbcon/core to drivers/
video/console
o fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: *
updated path drivers/video/fbcon/core to drivers/video/console * context
changes
o firmware: qcom: scm: Ensure 'a0' status code is treated as signed
(git-fixes).
o fix regression in "epoll: Keep a reference on files added to the check
list" (bsc#1180031, git-fixes).
o forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
o fs: Do not invalidate page buffers in block_write_full_page() (bsc#
1179711).
o geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
o genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#
1065729).
o gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
o gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in
grgpio_irq_map/unmap() (git-fixes).
o gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
o gpio: max77620: Fixup debounce delays (git-fixes).
o gpio: max77620: Use correct unit for debounce times (git-fixes).
o gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
o gpio: mvebu: fix potential user-after-free on probe (git-fixes).
o gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism
(git-fixes).
o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288
model (git-fixes).
o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288
model (git-fixes).
o gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
o gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option
(git-fixes).
o gpiolib: acpi: Turn dmi_system_id table into a generic quirk table
(git-fixes).
o gpiolib: fix up emulated open drain outputs (git-fixes).
o HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
o HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
o HID: core: check whether Usage Page item is after Usage ID items
(git-fixes).
o HID: core: Correctly handle ReportSize being zero (git-fixes).
o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
o HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
o HID: Improve Windows Precision Touchpad detection (git-fixes).
o HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring()
(git-fixes).
o HID: logitech-hidpp: Silence intermittent get_battery_capacity errors
(git-fixes).
o HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
o hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
o hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
o i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
o i2c: i801: Fix resume bug (git-fixes).
o i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets
(git-fixes).
o i2c: pxa: clear all master action bits in i2c_pxa_stop_message()
(git-fixes).
o i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
o i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
o ibmvnic: add some debugs (bsc#1179896 ltc#190255).
o ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
o ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#
184239 git-fixes).
o ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098
git-fixes).
o ibmvnic: enhance resetting status check during module exit (bsc#1065729).
o ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853
git-fixes).
o ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855
ltc#155067 git-fixes).
o ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
o ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#
155423 git-fixes).
o ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432
git-fixes).
o igc: Fix returning wrong statistics (bsc#1118657).
o iio: adc: max1027: Reset the device at probe time (git-fixes).
o iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in
rockchip_saradc_resume (git-fixes).
o iio: bmp280: fix compensation of humidity (git-fixes).
o iio: buffer: Fix demux update (git-fixes).
o iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw()
(git-fixes).
o iio: fix center temperature of bmc150-accel-core (git-fixes).
o iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting
(git-fixes).
o iio: light: bh1750: Resolve compiler warning and make code more readable
(git-fixes).
o iio: srf04: fix wrong limitation in distance measuring (git-fixes).
o iio:imu:bmi160: Fix too large a buffer (git-fixes).
o iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
o inet_ecn: Fix endianness of checksum update when setting ECT(1)
(git-fixes).
o Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
o Input: ads7846 - fix race that causes missing releases (git-fixes).
o Input: ads7846 - fix unaligned access on 7845 (git-fixes).
o Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
o Input: cm109 - do not stomp on control URB (git-fixes).
o Input: cros_ec_keyb - send 'scancodes' in addition to key events
(git-fixes).
o Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet
(git-fixes).
o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
o Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
o Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists
(git-fixes).
o Input: i8042 - allow insmod to succeed on devices without an i8042
controller (git-fixes).
o Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
o Input: omap4-keypad - fix runtime PM error handling (git-fixes).
o Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
o Input: trackpoint - add new trackpoint variant IDs (git-fixes).
o Input: trackpoint - enable Synaptics trackpoints (git-fixes).
o Input: xpad - support Ardwiino Controllers (git-fixes).
o ipw2x00: Fix -Wcast-function-type (git-fixes).
o irqchip/alpine-msi: Fix freeing of interrupts on allocation error path
(git-fixes).
o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
o iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
o iwlwifi: pcie: limit memory read spin time (git-fixes).
o kABI fix for g2d (git-fixes).
o kABI workaround for dsa/b53 changes (git-fixes).
o kABI workaround for HD-audio generic parser (git-fixes).
o kABI workaround for net/ipvlan changes (git-fixes).
o kABI workaround for usermodehelper changes (bsc#1179406).
o kABI: ath10k: move a new structure member to the end (git-fixes).
o kABI: genirq: add back irq_create_mapping (bsc#1065729).
o kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT
is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
o kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
o kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc
#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
o kgdb: Fix spurious true from in_dbg_master() (git-fixes).
o KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#
1112178).
o mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
o mac80211: Check port authorization in the ieee80211_tx_dequeue() case
(git-fixes).
o mac80211: do not set set TDLS STA bandwidth wider than possible
(git-fixes).
o mac80211: fix authentication with iwlwifi/mvm (git-fixes).
o mac80211: fix use of skb payload instead of header (git-fixes).
o mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
o matroxfb: avoid -Warray-bounds warning (git-fixes).
o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#
1163727).
o md-cluster: fix safemode_delay value when converting to clustered bitmap
(bsc#1163727).
o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
o md/cluster: block reshape with remote resync job (bsc#1163727).
o md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
o md/raid5: fix oops during stripe resizing (git-fixes).
o media: am437x-vpfe: Setting STD to current value is not an error
(git-fixes).
o media: cec-funcs.h: add status_req checks (git-fixes).
o media: cx88: Fix some error handling path in 'cx8800_initdev()'
(git-fixes).
o media: gspca: Fix memory leak in probe (git-fixes).
o media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
o media: i2c: ov2659: Fix missing 720p register config (git-fixes).
o media: i2c: ov2659: fix s_stream return value (git-fixes).
o media: msi2500: assign SPI bus number dynamically (git-fixes).
o media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
o media: mtk-vcodec: add missing put_device() call in
mtk_vcodec_release_dec_pm() (git-fixes).
o media: platform: add missing put_device() call in mtk_jpeg_probe() and
mtk_jpeg_remove() (git-patches).
o media: pvrusb2: Fix oops on tear-down when radio support is not present
(git-fixes).
o media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()
' (git-fixes).
o media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
o media: si470x-i2c: add missed operations in remove (git-fixes).
o media: siano: fix memory leak of debugfs members in smsdvb_hotplug
(git-fixes).
o media: solo6x10: fix missing snd_card_free in error handling case
(git-fixes).
o media: sti: bdisp: fix a possible sleep-in-atomic-context bug in
bdisp_device_run() (git-fixes).
o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
o media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases
(git-fixes).
o media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence
number (git-fixes).
o media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage
(git-fixes).
o media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic
(git-fixes).
o media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel
format (git-fixes).
o media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
o media: uvcvideo: Set media controller entity functions (git-fixes).
o media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
o media: v4l2-async: Fix trivial documentation typo (git-fixes).
o media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
o media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in
v4l2_device macros (git-fixes).
o mei: bus: do not clean driver pointer (git-fixes).
o mei: protect mei_cl_mtu from null dereference (git-fixes).
o memstick: fix a double-free bug in memstick_check (git-fixes).
o memstick: r592: Fix error return in r592_probe() (git-fixes).
o mfd: rt5033: Fix errorneous defines (git-fixes).
o mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
o mlxsw: core: Fix memory leak on module removal (bsc#1112374).
o mm,memory_failure: always pin the page in madvise_inject_error (bsc#
1180258).
o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault()
(bsc#1179204).
o Move upstreamed bt fixes into sorted section
o mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
o net/smc: fix valid DMBE buffer sizes (git-fixes).
o net/tls: Fix kmap usage (bsc#1109837).
o net/tls: missing received data after fast remote close (bsc#1109837).
o net/x25: prevent a couple of overflows (bsc#1178590).
o net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
o net: aquantia: fix LRO with FCS error (git-fixes).
o net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).
o net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan()
(git-fixes).
o net: dsa: b53: Ensure the default VID is untagged (git-fixes).
o net: dsa: b53: Fix default VLAN ID (git-fixes).
o net: dsa: b53: Properly account for VLAN filtering (git-fixes).
o net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
o net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend()
(git-fixes).
o net: dsa: qca8k: remove leftover phy accessors (git-fixes).
o net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
o net: ena: handle bad request id in ena_netdev (git-fixes).
o net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).
o net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
o net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
o net: macb: add missing barriers when reading descriptors (git-fixes).
o net: macb: fix dropped RX frames due to a race (git-fixes).
o net: macb: fix error format in dev_err() (git-fixes).
o net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).
o net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
o net: phy: Avoid multiple suspends (git-fixes).
o net: qed: fix "maybe uninitialized" warning (bsc#1136460 jsc#SLE-4691 bsc#
1136461 jsc#SLE-4692).
o net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#
1104389).
o net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc
#1136461 jsc#SLE-4692).
o net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc
#SLE-4691 bsc#1136461 jsc#SLE-4692).
o net: seeq: Fix the function used to release some memory in an error
handling path (git-fixes).
o net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
o net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
o net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
o net: stmmac: fix csr_clk can't be zero issue (git-fixes).
o net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
o net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).
o net: usb: sr9800: fix uninitialized local variable (git-fixes).
o net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
o net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#
1056787).
o nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
o nfc: s3fwrn5: Release the nfc firmware (git-fixes).
o nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
o nfp: use correct define to return NONE fec (bsc#1109837).
o NFS: fix nfs_path in case of a rename retry (git-fixes).
o NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
o NFSv4.2: fix client's attribute cache management for copy_file_range
(git-fixes).
o NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag
(git-fixes).
o ocfs2: fix unbalanced locking (bsc#1180506).
o ocfs2: initialize ip_next_orphan (bsc#1179724).
o orinoco: Move context allocation after processing the skb (git-fixes).
o parport: load lowlevel driver if ports not found (git-fixes).
o PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
o PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge
(git-fixes).
o PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
o PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
o phy: Revert toggling reset changes (git-fixes).
o pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
o pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
o pinctrl: amd: remove debounce filter setting in IRQ type setting
(git-fixes).
o pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
o pinctrl: baytrail: Avoid clearing debounce value when turning it off
(git-fixes).
o pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe()
(git-fixes).
o pinctrl: merrifield: Set default bias in case no particular value given
(git-fixes).
o pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
o platform/x86: acer-wmi: add automatic keyboard background light toggle key
as KEY_LIGHTS_TOGGLE (git-fixes).
o platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init
(git-fixes).
o platform/x86: mlx-platform: Fix item counter assignment for MSN2700,
MSN24xx systems (git-fixes).
o platform/x86: mlx-platform: remove an unused variable (git-fixes).
o platform/x86: mlx-platform: Remove PSU EEPROM from default platform
configuration (git-fixes).
o platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform
configuration (git-fixes).
o PM / hibernate: memory_bm_find_bit(): Tighten node optimisation
(git-fixes).
o PM: ACPI: Output correct message on target power state (git-fixes).
o PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
o PM: hibernate: remove the bogus call to get_gendisk() in software_resume()
(git-fixes).
o pNFS/flexfiles: Fix list corruption if the mirror count changes
(git-fixes).
o power: supply: bq24190_charger: fix reference leak (git-fixes).
o power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
o powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc
#1065729).
o powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#
1179888 ltc#190253).
o powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117
ltc#159753 git-fixes bsc#1179888 ltc#190253).
o powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753
git-fixes bsc#1179888 ltc#190253).
o powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
o powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#
184630).
o powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#
184630).
o powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#
1179578 ltc#189313).
o powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374
ltc#178199 git-fixes).
o powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
o powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067
git-fixes).
o powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
o powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#
184630).
o powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#
1065729).
o ppp: remove the PPPIOCDETACH ioctl (git-fixes).
o pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
o qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#
1050545).
o qed: suppress "do not support RoCE & iWARP" flooding on HW init (bsc#
1050536 bsc#1050545).
o qed: suppress false-positives interrupt error messages on HW init (bsc#
1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
o quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
o radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
o ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
o RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#
1050545).
o RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).
o reboot: fix overflow parsing reboot cpu number (bsc#1179421).
o regmap: debugfs: check count when read regmap file (git-fixes).
o regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
o regmap: Remove duplicate `type` field from regmap `regcache_sync` trace
event (git-fixes).
o regulator: max8907: Fix the usage of uninitialized variable in
max8907_regulator_probe() (git-fixes).
o regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe()
could be uninitialized (git-fixes).
o regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/
ti_abb_clear_all_txdone (git-fixes).
o reiserfs: Fix oops during mount (bsc#1179715).
o reiserfs: Initialize inode keys properly (bsc#1179713).
o remoteproc: Fix wrong rvring index computation (git-fixes).
o rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
o rtc: 88pm860x: fix possible race condition (git-fixes).
o rtc: hym8563: enable wakeup when applicable (git-fixes).
o rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot
(git-fixes).
o rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
o s390/bpf: Fix multiple tail calls (git-fixes).
o s390/cpuinfo: show processor physical address (git-fixes).
o s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
o s390/dasd: fix hanging device offline processing (bsc#1144912).
o s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
o s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
o s390/qeth: fix af_iucv notification race (git-fixes).
o s390/qeth: fix tear down of async TX buffers (git-fixes).
o s390/qeth: make af_iucv TX notification call more robust (git-fixes).
o s390/stp: add locking to sysfs functions (git-fixes).
o s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).
o scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
o scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
o scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#
1164780).
o scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#
1164780).
o scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#
1164780).
o scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
o scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#
1164780).
o scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#
1164780).
o scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#
1164780).
o scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
o scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional
events (bsc#1164780).
o scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
o scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
o scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#
1164780).
o scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#
1164780).
o scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
o scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#
1164780).
o scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi()
(bsc#1164780).
o scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
o scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
o scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#
1164780).
o scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#
1164780).
o scsi: lpfc: Fix removal of SCSI transport device get and put on dev
structure (bsc#1164780).
o scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi
(bsc#1164780).
o scsi: lpfc: Fix set but not used warnings from Rework remote port lock
handling (bsc#1164780).
o scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler()
(bsc#1164780).
o scsi: lpfc: Fix spelling mistake "Cant" -> "Can't" (bsc#1164780).
o scsi: lpfc: Fix variable 'vport' set but not used in
lpfc_sli4_abts_err_handler() (bsc#1164780).
o scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions
(bsc#1164780).
o scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#
1164780).
o scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues
(bsc#1164780).
o scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
o scsi: lpfc: Refactor WQE structure definitions for common use (bsc#
1164780).
o scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
o scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
o scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails
(bsc#1164780).
o scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
o scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store()
(bsc#1164780).
o scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
o scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
o scsi: lpfc: Rework remote port lock handling (bsc#1164780).
o scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
o scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping
it (bsc#1164780).
o scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
o scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
o scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
o scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
o scsi: lpfc: Use generic power management (bsc#1164780).
o scsi: qla2xxx: Change post del message from debug level to log level (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#
1179810).
o scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines
(bsc#1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry
(bsc#1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#
1172538 bsc#1179142 bsc#1179810).
o scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#
1179810).
o scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538
bsc#1179142 bsc#1179810).
o scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc
#1179810).
o scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#
1179142 bsc#1179810).
o scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142
bsc#1179810).
o scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#
1179810).
o scsi: Remove unneeded break statements (bsc#1164780).
o scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
o scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#
1179142 bsc#1179810).
o serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
o serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
o serial: amba-pl011: Make sure we initialize the port.lock spinlock
(git-fixes).
o serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
o serial: txx9: add missing platform_driver_unregister() on error in
serial_txx9_init (git-fixes).
o serial_core: Check for port state when tty is in error state (git-fixes).
o SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
o SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
o SMB3: Honor lease disabling for multiuser mounts (git-fixes).
o soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
o soc: imx: gpc: fix power up sequencing (git-fixes).
o soc: mediatek: Check if power domains can be powered on at boot time
(git-fixes).
o soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
o soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
o soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
o spi: Add call to spi_slave_abort() function when spidev driver is released
(git-fixes).
o spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in
bcm63xx_hsspi_resume (git-fixes).
o spi: davinci: Fix use-after-free on unbind (git-fixes).
o spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
o spi: dw: Fix Rx-only DMA transfers (git-fixes).
o spi: dw: Return any value retrieved from the dma_transfer callback
(git-fixes).
o spi: Fix memory leak on splited transfers (git-fixes).
o spi: img-spfi: fix potential double release (git-fixes).
o spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
o spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
o spi: pxa2xx: Add missed security checks (git-fixes).
o spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
o spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
o spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
o spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
o spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
o spi: spidev: fix a potential use-after-free in spidev_release()
(git-fixes).
o spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path
(git-fixes).
o spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
o spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
o spi: tegra20-slink: add missed clk_unprepare (git-fixes).
o spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
o splice: only read in as much information as there is pipe buffer space (bsc
#1179520).
o staging: comedi: check validity of wMaxPacketSize of usb endpoints found
(git-fixes).
o staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value
(git-fixes).
o staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
o staging: olpc_dcon: add a missing dependency (git-fixes).
o staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe
() (git-fixes).
o staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21
(git-fixes).
o staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
o staging: rtl8188eu: fix possible null dereference (git-fixes).
o staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
o staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
o staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb()
(git-fixes).
o staging: wlan-ng: properly check endpoint types (git-fixes).
o sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#
1103992).
o sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
o sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment()
(git-fixes).
o sunrpc: The RDMA back channel mustn't disappear while requests are
outstanding (git-fixes).
o svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#
1103992).
o svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).
o tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#
1109837).
o thunderbolt: Use 32-bit writes when writing ring producer/consumer
(git-fixes).
o timer: Fix wheel index calculation on last level (git fixes)
o timer: Prevent base->clk from moving backward (git-fixes)
o tracing: Fix out of bounds write in get_trace_buf (bsc#1179403).
o tty: always relink the port (git-fixes).
o tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
o tty: link tty and port before configuring it as console (git-fixes).
o tty: synclink_gt: Adjust indentation in several functions (git-fixes).
o tty: synclinkmp: Adjust indentation in several functions (git-fixes).
o tty:serial:mvebu-uart:fix a wrong return (git-fixes).
o uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
o uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
o usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
o usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul
(git-fixes).
o usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
o usb: dwc2: Fix IN FIFO allocation (git-fixes).
o usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
o usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe
(git-fixes).
o usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
o usb: fsl: Check memory resource before releasing it (git-fixes).
o usb: gadget: composite: Fix possible double free memory bug (git-fixes).
o usb: gadget: configfs: fix concurrent issue between composite APIs
(git-fixes).
o usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
o usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
o usb: gadget: f_fs: Use local copy of descriptors for userspace copy
(git-fixes).
o usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
o usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
o usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
o usb: gadget: fix wrong endpoint desc (git-fixes).
o usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
o usb: gadget: net2280: fix memory leak on probe error handling paths
(git-fixes).
o usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
o usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe()
(git-fixes).
o usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init
() (git-fixes).
o usb: hso: Fix debug compile warning on sparc32 (git-fixes).
o usb: ldusb: use unsigned size format specifiers (git-fixes).
o usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue
(git-fixes).
o usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
o usb: serial: ch341: add new Product ID for CH341A (git-fixes).
o usb: serial: ch341: sort device-id entries (git-fixes).
o usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).
o usb: serial: digi_acceleport: clean up set_termios (git-fixes).
o usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
o usb: serial: digi_acceleport: remove in_interrupt() usage.
o usb: serial: digi_acceleport: remove redundant assignment to pointer priv
(git-fixes).
o usb: serial: digi_acceleport: rename tty flag variable (git-fixes).
o usb: serial: digi_acceleport: use irqsave() in USB's complete callback
(git-fixes).
o usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
o usb: serial: keyspan_pda: fix stalled writes (git-fixes).
o usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
o usb: serial: keyspan_pda: fix write deadlock (git-fixes).
o usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
o usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
o usb: serial: kl5kusb105: fix memleak on open (git-fixes).
o usb: serial: mos7720: fix parallel-port state restore (git-fixes).
o usb: serial: option: add Fibocom NL668 variants (git-fixes).
o usb: serial: option: add interface-number sanity check to flag handling
(git-fixes).
o usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
o usb: serial: option: fix Quectel BG96 matching (git-fixes).
o usb: Skip endpoints with 0 maxpacket length (git-fixes).
o usb: UAS: introduce a quirk to set no_write_same (git-fixes).
o usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
o usblp: poison URBs upon disconnect (git-fixes).
o usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
o usermodehelper: reset umask to default before executing user process (bsc#
1179406).
o video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
o vt: do not hardcode the mem allocation upper bound (git-fixes).
o vt: Reject zero-sized screen buffer size (git-fixes).
o watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
o watchdog: da9062: do not ping the hw during stop() (git-fixes).
o watchdog: da9062: No need to ping manually before setting timeout
(git-fixes).
o watchdog: qcom: Avoid context switch in restart handler (git-fixes).
o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
o wimax: fix duplicate initializer warning (git-fixes).
o wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
o wireless: Use offsetof instead of custom macro (git-fixes).
o x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#
1112178).
o x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes
bytes (bsc#1112178).
o x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
o x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
o x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc
#1112178).
o x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1114648).
o x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#
1112178).
o x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak
(bsc#1112178).
o x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
o x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc
#1112178).
o x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
o x86/traps: Simplify pagefault tracing logic (bsc#1179895).
o x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
(bsc#1112178).
o xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
o xprtrdma: fix incorrect header size calculations (git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Workstation Extension 12-SP5:
zypper in -t patch SUSE-SLE-WE-12-SP5-2021-133=1
o SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-133=1
o SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-133=1
o SUSE Linux Enterprise Live Patching 12-SP5:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2021-133=1
o SUSE Linux Enterprise High Availability 12-SP5:
zypper in -t patch SUSE-SLE-HA-12-SP5-2021-133=1
Package List:
o SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64):
kernel-default-debuginfo-4.12.14-122.57.1
kernel-default-debugsource-4.12.14-122.57.1
kernel-default-extra-4.12.14-122.57.1
kernel-default-extra-debuginfo-4.12.14-122.57.1
o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
s390x x86_64):
kernel-obs-build-4.12.14-122.57.1
kernel-obs-build-debugsource-4.12.14-122.57.1
o SUSE Linux Enterprise Software Development Kit 12-SP5 (noarch):
kernel-docs-4.12.14-122.57.1
o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
kernel-default-4.12.14-122.57.1
kernel-default-base-4.12.14-122.57.1
kernel-default-base-debuginfo-4.12.14-122.57.1
kernel-default-debuginfo-4.12.14-122.57.1
kernel-default-debugsource-4.12.14-122.57.1
kernel-default-devel-4.12.14-122.57.1
kernel-syms-4.12.14-122.57.1
o SUSE Linux Enterprise Server 12-SP5 (noarch):
kernel-devel-4.12.14-122.57.1
kernel-macros-4.12.14-122.57.1
kernel-source-4.12.14-122.57.1
o SUSE Linux Enterprise Server 12-SP5 (x86_64):
kernel-default-devel-debuginfo-4.12.14-122.57.1
o SUSE Linux Enterprise Server 12-SP5 (s390x):
kernel-default-man-4.12.14-122.57.1
o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
kernel-default-debuginfo-4.12.14-122.57.1
kernel-default-debugsource-4.12.14-122.57.1
kernel-default-kgraft-4.12.14-122.57.1
kernel-default-kgraft-devel-4.12.14-122.57.1
kgraft-patch-4_12_14-122_57-default-1-8.3.1
o SUSE Linux Enterprise High Availability 12-SP5 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.12.14-122.57.1
cluster-md-kmp-default-debuginfo-4.12.14-122.57.1
dlm-kmp-default-4.12.14-122.57.1
dlm-kmp-default-debuginfo-4.12.14-122.57.1
gfs2-kmp-default-4.12.14-122.57.1
gfs2-kmp-default-debuginfo-4.12.14-122.57.1
kernel-default-debuginfo-4.12.14-122.57.1
kernel-default-debugsource-4.12.14-122.57.1
ocfs2-kmp-default-4.12.14-122.57.1
ocfs2-kmp-default-debuginfo-4.12.14-122.57.1
References:
o https://www.suse.com/security/cve/CVE-2018-20669.html
o https://www.suse.com/security/cve/CVE-2019-20934.html
o https://www.suse.com/security/cve/CVE-2020-0444.html
o https://www.suse.com/security/cve/CVE-2020-0465.html
o https://www.suse.com/security/cve/CVE-2020-0466.html
o https://www.suse.com/security/cve/CVE-2020-27068.html
o https://www.suse.com/security/cve/CVE-2020-27777.html
o https://www.suse.com/security/cve/CVE-2020-27786.html
o https://www.suse.com/security/cve/CVE-2020-27825.html
o https://www.suse.com/security/cve/CVE-2020-28374.html
o https://www.suse.com/security/cve/CVE-2020-29660.html
o https://www.suse.com/security/cve/CVE-2020-29661.html
o https://www.suse.com/security/cve/CVE-2020-36158.html
o https://www.suse.com/security/cve/CVE-2020-4788.html
o https://bugzilla.suse.com/1040855
o https://bugzilla.suse.com/1044120
o https://bugzilla.suse.com/1044767
o https://bugzilla.suse.com/1050242
o https://bugzilla.suse.com/1050536
o https://bugzilla.suse.com/1050545
o https://bugzilla.suse.com/1055117
o https://bugzilla.suse.com/1056653
o https://bugzilla.suse.com/1056657
o https://bugzilla.suse.com/1056787
o https://bugzilla.suse.com/1064802
o https://bugzilla.suse.com/1065729
o https://bugzilla.suse.com/1066129
o https://bugzilla.suse.com/1094840
o https://bugzilla.suse.com/1103990
o https://bugzilla.suse.com/1103992
o https://bugzilla.suse.com/1104389
o https://bugzilla.suse.com/1104393
o https://bugzilla.suse.com/1109695
o https://bugzilla.suse.com/1109837
o https://bugzilla.suse.com/1110096
o https://bugzilla.suse.com/1112178
o https://bugzilla.suse.com/1112374
o https://bugzilla.suse.com/1114648
o https://bugzilla.suse.com/1115431
o https://bugzilla.suse.com/1118657
o https://bugzilla.suse.com/1122971
o https://bugzilla.suse.com/1129770
o https://bugzilla.suse.com/1136460
o https://bugzilla.suse.com/1136461
o https://bugzilla.suse.com/1138374
o https://bugzilla.suse.com/1139944
o https://bugzilla.suse.com/1144912
o https://bugzilla.suse.com/1152457
o https://bugzilla.suse.com/1163727
o https://bugzilla.suse.com/1164780
o https://bugzilla.suse.com/1171078
o https://bugzilla.suse.com/1172145
o https://bugzilla.suse.com/1172538
o https://bugzilla.suse.com/1172694
o https://bugzilla.suse.com/1174784
o https://bugzilla.suse.com/1174852
o https://bugzilla.suse.com/1176558
o https://bugzilla.suse.com/1176559
o https://bugzilla.suse.com/1176956
o https://bugzilla.suse.com/1177666
o https://bugzilla.suse.com/1178270
o https://bugzilla.suse.com/1178372
o https://bugzilla.suse.com/1178401
o https://bugzilla.suse.com/1178590
o https://bugzilla.suse.com/1178634
o https://bugzilla.suse.com/1178762
o https://bugzilla.suse.com/1179014
o https://bugzilla.suse.com/1179015
o https://bugzilla.suse.com/1179045
o https://bugzilla.suse.com/1179082
o https://bugzilla.suse.com/1179107
o https://bugzilla.suse.com/1179142
o https://bugzilla.suse.com/1179204
o https://bugzilla.suse.com/1179403
o https://bugzilla.suse.com/1179406
o https://bugzilla.suse.com/1179418
o https://bugzilla.suse.com/1179419
o https://bugzilla.suse.com/1179421
o https://bugzilla.suse.com/1179444
o https://bugzilla.suse.com/1179520
o https://bugzilla.suse.com/1179578
o https://bugzilla.suse.com/1179601
o https://bugzilla.suse.com/1179616
o https://bugzilla.suse.com/1179663
o https://bugzilla.suse.com/1179666
o https://bugzilla.suse.com/1179670
o https://bugzilla.suse.com/1179671
o https://bugzilla.suse.com/1179672
o https://bugzilla.suse.com/1179673
o https://bugzilla.suse.com/1179711
o https://bugzilla.suse.com/1179713
o https://bugzilla.suse.com/1179714
o https://bugzilla.suse.com/1179715
o https://bugzilla.suse.com/1179716
o https://bugzilla.suse.com/1179722
o https://bugzilla.suse.com/1179723
o https://bugzilla.suse.com/1179724
o https://bugzilla.suse.com/1179745
o https://bugzilla.suse.com/1179810
o https://bugzilla.suse.com/1179888
o https://bugzilla.suse.com/1179895
o https://bugzilla.suse.com/1179896
o https://bugzilla.suse.com/1179960
o https://bugzilla.suse.com/1179963
o https://bugzilla.suse.com/1180027
o https://bugzilla.suse.com/1180029
o https://bugzilla.suse.com/1180031
o https://bugzilla.suse.com/1180052
o https://bugzilla.suse.com/1180086
o https://bugzilla.suse.com/1180117
o https://bugzilla.suse.com/1180258
o https://bugzilla.suse.com/1180506
o https://bugzilla.suse.com/1180559
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=uAJS
-----END PGP SIGNATURE-----
ESB-2020.4482.2 - UPDATE [Appliance] BIG-IP Products: Cross-site scripting - Remote with user interaction
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2020.4482.2
BIG-IP Products - Configuration utility XSS vulnerability CVE-2020-27719
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: BIG-IP Products
Publisher: F5 Networks
Operating System: Network Appliance
Impact/Access: Cross-site Scripting -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2020-27719
Original Bulletin:
https://support.f5.com/csp/article/K19166530
Revision History: January 18 2021: Vendor updated mitigation section
December 18 2020: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
K19166530: XSS vulnerability CVE-2020-27719
Original Publication Date: 17 Dec, 2020
Latest Publication Date: 16 Jan, 2021
Security Advisory Description
A cross-site scripting (XSS) vulnerability exists in an undisclosed page of the
BIG-IP Configuration utility. (CVE-2020-27719)
Impact
An attacker can exploit this vulnerability to run JavaScript in the context of
the currently logged-in user. An administrative user with access to the
Advanced Shell (bash) who successfully exploits this vulnerability can
completely compromise the BIG-IP system through remote code execution.
Security Advisory Status
F5 Product Development has assigned ID 928321 (BIG-IP) to this vulnerability.
To determine if your product and version have been evaluated for this
vulnerability, refer to the Applies to (see versions) box. To determine if your
release is known to be vulnerable, the components or features that are affected
by the vulnerability, and for information about releases, point releases, or
hotfixes that address the vulnerability, refer to the following table. For more
information about security advisory versioning, refer to K51812227:
Understanding security advisory versioning.
+----------------+------+----------+----------+----------+------+-------------+
| | |Versions |Fixes | |CVSSv3|Vulnerable |
|Product |Branch|known to |introduced|Severity |score^|component or |
| | |be |in | |1 |feature |
| | |vulnerable| | | | |
+----------------+------+----------+----------+----------+------+-------------+
| |16.x |16.0.0 |16.0.1 | | | |
| +------+----------+----------+ | | |
| |15.x |15.0.0 - |15.1.1 | | | |
| | |15.1.0 | | | | |
|BIG-IP (LTM, +------+----------+----------+ | | |
|AAM, Advanced |14.x |14.1.0 - |14.1.3.1 | | | |
|WAF, AFM, | |14.1.3 | | | | |
|Analytics, APM, +------+----------+----------+High |7.5 |Configuration|
|ASM, DDHD, DNS, |13.x |None |Not | | |utility |
|FPS, GTM, Link | | |applicable| | | |
|Controller, PEM,+------+----------+----------+ | | |
|SSLO) |12.x |None |Not | | | |
| | | |applicable| | | |
| +------+----------+----------+ | | |
| |11.x |None |Not | | | |
| | | |applicable| | | |
+----------------+------+----------+----------+----------+------+-------------+
| |7.x |None |Not | | | |
| | | |applicable| | | |
|BIG-IQ +------+----------+----------+ | | |
|Centralized |6.x |None |Not |Not |None |None |
|Management | | |applicable|vulnerable| | |
| +------+----------+----------+ | | |
| |5.x |None |Not | | | |
| | | |applicable| | | |
+----------------+------+----------+----------+----------+------+-------------+
|Traffix SDC |5.x |None |Not |Not |None |None |
| | | |applicable|vulnerable| | |
+----------------+------+----------+----------+----------+------+-------------+
^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.
Security Advisory Recommended Actions
If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by upgrading to a version listed
in the Fixes introduced in column. If the table lists only an older version
than what you are currently running, or does not list a non-vulnerable version,
then no upgrade candidate currently exists.
Mitigation
To mitigate this vulnerability, you should permit management access to F5
products only over a secure network, and limit access to only trusted users.
For more information about securing access to BIG-IP systems, refer to K13092:
Overview of securing access to the BIG-IP system.
The trusted users with access to the Configuration utility should take
precaution when selecting hyperlinks from untrusted or unknown sources. The
attack for this vulnerability is most likely to happen in the form of a
phishing attack.
Acknowledgements
F5 acknowledges Kevin Breen for bringing this issue to our
attention and following the highest standards of coordinated disclosure.
Supplemental Information
o K41942608: Overview of security advisory articles
o K4602: Overview of the F5 security vulnerability response policy
o K4918: Overview of the F5 critical issue hotfix policy
o K9502: BIG-IP hotfix and point release matrix
o K13123: Managing BIG-IP product hotfixes (11.x - 16.x)
o K167: Downloading software and firmware from F5
o K9970: Subscribing to email notifications regarding F5 products
o K9957: Creating a custom RSS feed to view new and updated documents
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=mtdZ
-----END PGP SIGNATURE-----
ESB-2020.4371.3 - UPDATE [Appliance] BIG-IP: Access privileged data - Remote/unauthenticated
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2020.4371.3
OpenSSL vulnerability CVE-2020-1968
18 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: BIG-IP
Publisher: F5 Networks
Operating System: Network Appliance
Impact/Access: Access Privileged Data -- Remote/Unauthenticated
Resolution: Mitigation
CVE Names: CVE-2020-1968
Reference: ESB-2020.4298
ESB-2020.3493
ESB-2020.3318
ESB-2020.3170
Original Bulletin:
https://support.f5.com/csp/article/K92451315
Revision History: January 18 2021: Vendor issued minor update
January 4 2021: Additional mitigation instructions added by vendor
December 11 2020: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
K92451315: OpenSSL vulnerability CVE-2020-1968
Original Publication Date: 11 Dec, 2020
Latest Publication Date: 16 Jan, 2021
Security Advisory Description
The Raccoon attack exploits a flaw in the TLS specification which can lead to
an attacker being able to compute the pre-master secret in connections which
have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would
result in the attacker being able to eavesdrop on all encrypted communications
sent over that TLS connection. The attack can only be exploited if an
implementation re-uses a DH secret across multiple TLS connections. Note that
this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue
affects OpenSSL 1.0.2 which is out of support and no longer receiving public
updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w
(Affected 1.0.2-1.0.2v). (CVE-2020-1968)
Impact
An attacker may be able to exploit OpenSSL Transport Layer Security (TLS),
which allows unauthorized exposure of information when Diffie-Hellman (DH)
secrets are reused across multiple TLS connections.
Security Advisory Status
F5 Product Development has assigned ID 945421 (BIG-IP) to this vulnerability.
To determine if your product and version have been evaluated for this
vulnerability, refer to the Applies to (see versions) box. To determine if your
release is known to be vulnerable, the components or features that are affected
by the vulnerability, and for information about releases, point releases, or
hotfixes that address the vulnerability, refer to the following table. For more
information about security advisory versioning, refer to K51812227:
Understanding security advisory versioning.
+------------------+------+----------+----------+----------+------+-----------+
| | |Versions |Fixes | |CVSSv3|Vulnerable |
|Product |Branch|known to |introduced|Severity |score^|component |
| | |be |in | |1 |or feature |
| | |vulnerable| | | | |
+------------------+------+----------+----------+----------+------+-----------+
| |16.x |16.0.0 - |None | | | |
| | |16.0.1 | | | | |
| +------+----------+----------+ | | |
| |15.x |15.1.0 - |None | | | |
| | |15.1.2 | | | | |
|BIG-IP (LTM, AAM, +------+----------+----------+ | | |
|Advanced WAF, AFM,|14.x |14.1.0 - |None | | |TLS |
|Analytics, APM, | |14.1.3 | | | |connections|
|ASM, DDHD, DNS, +------+----------+----------+Medium |5.9 |(OpenSSL, |
|FPS, GTM, Link |13.x |13.1.0 - |None | | |SSL |
|Controller, PEM, | |13.1.3 | | | |profiles) |
|SSLO) +------+----------+----------+ | | |
| |12.x |12.1.0 - |None | | | |
| | |12.1.5 | | | | |
| +------+----------+----------+ | | |
| |11.x |11.6.1 - |None | | | |
| | |11.6.5 | | | | |
+------------------+------+----------+----------+----------+------+-----------+
| |7.x |None |Not | | | |
| | | |applicable| | | |
| +------+----------+----------+ | | |
|BIG-IQ Centralized|6.x |None |Not |Not |None |None |
|Management | | |applicable|vulnerable| | |
| +------+----------+----------+ | | |
| |5.x |None |Not | | | |
| | | |applicable| | | |
+------------------+------+----------+----------+----------+------+-----------+
|Traffix SDC |5.x |None |Not |Not |None |None |
| | | |applicable|vulnerable| | |
+------------------+------+----------+----------+----------+------+-----------+
^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.
Security Advisory Recommended Actions
If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by upgrading to a version listed
in the Fixes introduced in column. If the table lists only an older version
than what you are currently running, or does not list a non-vulnerable version,
then no upgrade candidate currently exists.
Mitigation
To mitigate this vulnerability, you can disable DH ciphersuites key exchanges
in the vulnerable components. The Elliptic Curve Diffie-Hellman (ECDH)
ciphersuites exchanges are not affected. To disable the DH ciphersuites in the
SSL profile, perform the following procedure:
Impact of procedure: Performing the following procedure should not have a
negative impact on your system. The changes take effect when you associate the
new SSL profile to a virtual server.
1. Log in to the Configuration utility.
2. Go to Local Traffic > Profiles > SSL > Client.
3. Select Create.
4. For the new profile, under General Properties, enter a name.
5. Set Configuration to Advanced.
6. For Ciphers, select the Custom check box.
7. For Ciphers, select Cipher Suites.
Note: In BIG-IP 13.x, select Cipher String. In BIG-IP 11.x through 12.x,
skip this step.
8. For Ciphers, enter a cipher string.
For example, to disable the TLSv1 protocol and DHE ciphers, use the
following syntax:
DEFAULT:!TLSv1:!DHE
9. Configure the remaining profile settings.
10. Select Finished.
For more information about configuring ciphers on SSL profiles, refer to
K13171: Configuring the cipher strength for SSL profiles (11.x).
Additionally, to mitigate this vulnerability, you should permit management
access to F5 products only over a secure network and restrict command line
access for affected systems to trusted users. For more information, refer to
K13309: Restricting access to the Configuration utility by source IP address
(11.x - 16.x) and K13092: Overview of securing access to the BIG-IP system.
Supplemental Information
o K41942608: Overview of security advisory articles
o K91158923: BIG-IP SSL/TLS ADH/DHE vulnerability CVE-2020-5929
o K4602: Overview of the F5 security vulnerability response policy
o K4918: Overview of the F5 critical issue hotfix policy
o K9502: BIG-IP hotfix and point release matrix
o K13123: Managing BIG-IP product hotfixes (11.x - 16.x)
o K48955220: Installing an OPSWAT Endpoint Security update on BIG-IP APM
systems (11.4.x and later)
o K167: Downloading software and firmware from F5
o K9970: Subscribing to email notifications regarding F5 products
o K9957: Creating a custom RSS feed to view new and updated documents
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=gMEL
-----END PGP SIGNATURE-----
ESB-2021.0191 - [Win][UNIX/Linux] Jenkins: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0191
Jenkins Security Advisory 2021-01-13
15 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Jenkins Core
Jenkins plugins
Publisher: Jenkins
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Overwrite Arbitrary Files -- Existing Account
Cross-site Scripting -- Remote with User Interaction
Denial of Service -- Existing Account
Access Confidential Data -- Existing Account
Reduced Security -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21614 CVE-2021-21613 CVE-2021-21612
CVE-2021-21611 CVE-2021-21610 CVE-2021-21609
CVE-2021-21608 CVE-2021-21607 CVE-2021-21606
CVE-2021-21605 CVE-2021-21604 CVE-2021-21603
CVE-2021-21602 CVE-2018-1000862
Original Bulletin:
https://www.jenkins.io/security/advisory/2021-01-13/
- --------------------------BEGIN INCLUDED TEXT--------------------
Jenkins Security Advisory 2021-01-13
This advisory announces vulnerabilities in the following Jenkins deliverables:
* Jenkins (core)
* Bumblebee HP ALM Plugin
* TICS Plugin
* TraceTronic ECU-TEST Plugin
Descriptions
XSS vulnerability in notification bar
SECURITY-1889 / CVE-2021-21603
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification
bar response contents (typically shown after form submissions via Apply
button).
This results in a cross-site scripting (XSS) vulnerability exploitable by
attackers able to influence notification bar contents.
Jenkins 2.275, LTS 2.263.2 escapes the content shown in notification bars.
Stored XSS vulnerability in button labels
SECURITY-2035 / CVE-2021-21608
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button
labels in the Jenkins UI.
This results in a cross-site scripting vulnerability exploitable by attackers
with the ability to control button labels. An example of buttons with a
user-controlled label are the buttons of the Pipeline input step.
Jenkins 2.275, LTS 2.263.2 escapes button labels in the Jenkins UI.
Reflected XSS vulnerability in markup formatter preview
SECURITY-2153 / CVE-2021-21610
Jenkins allows administrators to choose the markup formatter to use for
descriptions of jobs, builds, views, etc. displayed in Jenkins. When editing
such a description, users can choose to have Jenkins render a formatted preview
of the description they entered.
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any
restrictions for the URL rendering the formatted preview of markup passed as a
query parameter. This results in a reflected cross-site scripting (XSS)
vulnerability if the configured markup formatter does not prohibit unsafe
elements (JavaScript) in markup, like Anything Goes Formatter Plugin.
Jenkins 2.275, LTS 2.263.2 requires that preview URLs are accessed using POST
and sets Content-Security-Policy headers that prevent execution of unsafe
elements when the URL is accessed directly.
In case of problems with this change, these protections can be disabled by
setting the Java system properties
Note hudson.markup.MarkupFormatter.previewsAllowGET to true and/or
hudson.markup.MarkupFormatter.previewsSetCSP to false. Doing either is
discouraged.
Stored XSS vulnerability on new item page
SECURITY-2171 / CVE-2021-21611
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display
names and IDs of item types shown on the New Item page.
This results in a stored cross-site scripting (XSS) vulnerability exploitable
by attackers able to specify display names or IDs of item types.
As of the publication of this advisory, the Jenkins security team is not
Note aware of any plugins published via the Jenkins project update center that
allow doing this.
Jenkins 2.275, LTS 2.263.2 escapes display names and IDs of item types shown on
the New Item page.
Improper handling of REST API XML deserialization errors
SECURITY-1923 / CVE-2021-21604
Jenkins provides XML REST APIs to configure views, jobs, and other items. When
deserialization fails because of invalid data, Jenkins 2.274 and earlier, LTS
2.263.1 and earlier stores invalid object references created through these
endpoints in the Old Data Monitor. If an administrator discards the old data,
some erroneous data submitted to these endpoints may be persisted.
This allows attackers with View/Create, Job/Create, Agent/Create, or their
respective */Configure permissions to inject crafted content into Old Data
Monitor that results in the instantiation of potentially unsafe objects when
discarded by an administrator.
Jenkins 2.275, LTS 2.263.2 does not record submissions from users in Old Data
Monitor anymore.
In case of problems, the Java system properties
hudson.util.RobustReflectionConverter.recordFailuresForAdmins and
hudson.util.RobustReflectionConverter.recordFailuresForAllAuthentications can
be set to true to record configuration data submissions from administrators or
all users, partially or completely disabling this fix.
Arbitrary file read vulnerability in workspace browsers
SECURITY-1452 / CVE-2021-21602
The file browser for workspaces, archived artifacts, and $JENKINS_HOME/
userContent/ follows symbolic links to locations outside the directory being
browsed in Jenkins 2.274 and earlier, LTS 2.263.1 and earlier.
This allows attackers with Job/Workspace permission and the ability to control
workspace contents (e.g., with Job/Configure permission or the ability to
change SCM contents) to create symbolic links that allow them to access files
outside workspaces using the workspace browser.
Note This issue is caused by an incomplete fix for SECURITY-904 /
CVE-2018-1000862 in the 2018-12-08 security advisory.
Jenkins 2.275, LTS 2.263.2 no longer supports symlinks in workspace browsers.
While they may still exist on the file system, they are no longer shown on the
UI, accessible via URLs, or included in directory content downloads.
This fix only changes the behavior of the Jenkins UI. Archiving artifacts still
behaves as before.
Path traversal vulnerability in agent names
SECURITY-2021 / CVE-2021-21605
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/
Configure permission to choose agent names that cause Jenkins to override
unrelated config.xml files. If the global config.xml file is replaced, Jenkins
will start up with unsafe legacy defaults after a restart.
Jenkins 2.275, LTS 2.263.2 ensures that agent names are considered valid names
for items to prevent this problem.
In case of problems, this change can be reverted by setting the Java system
property jenkins.model.Nodes.enforceNameRestrictions to false.
Arbitrary file existence check in file fingerprints
SECURITY-2023 / CVE-2021-21606
Jenkins provides a feature for jobs to store and track fingerprints of files
used during a build. Jenkins 2.274 and earlier, LTS 2.263.1 and earlier
provides a REST API to check where a given fingerprint was used by which
builds. This endpoint does not fully validate that the provided fingerprint ID
is properly formatted before checking for the XML metadata for that fingerprint
on the controller file system.
This allows attackers with Overall/Read permission to check for the existence
of XML files on the controller file system where the relative path can be
constructed as 32 characters.
Jenkins 2.275, LTS 2.263.2 validates that a fingerprint ID is properly
formatted before checking for its existence.
Excessive memory allocation in graph URLs leads to denial of service
SECURITY-2025 / CVE-2021-21607
Jenkins renders several different graphs for features like agent and label
usage statistics, memory usage, or various plugin-provided statistics.
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit the graph
size provided as query parameters.
This allows attackers to request or to have legitimate Jenkins users request
crafted URLs that rapidly use all available memory in Jenkins, potentially
leading to out of memory errors.
Jenkins 2.275, LTS 2.263.2 limits the maximum size of graphs to an area of 10
million pixels. If a larger size is requested, the default size for the graph
will be rendered instead.
This threshold can be configured by setting the Java system property
hudson.util.Graph.maxArea to a different number on startup.
Missing permission check for paths with specific prefix
SECURITY-2047 / CVE-2021-21609
Jenkins includes a static list of URLs that are always accessible even without
Overall/Read permission, such as the login form. These URLs are excluded from
an otherwise universal permission check.
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly compare
requested URLs with that list.
This allows attackers without Overall/Read permission to access plugin-provided
URLs with any of the following prefixes if no other permissions are required:
* accessDenied
* error
* instance-identity
* login
* logout
* oops
* securityRealm
* signup
* tcpSlaveAgentListener
For example, a plugin contributing the path loginFoo/ would have URLs in that
space accessible without the default Overall/Read permission check.
The Jenkins security team is not aware of any affected plugins as of the
publication of this advisory.
The comparison of requested URLs with the list of always accessible URLs has
been fixed to only allow access to the specific listed URLs in Jenkins 2.275,
LTS 2.263.2.
In case this change causes problems, additional paths can be made accessible
without Overall/Read permissions: The Java system property
jenkins.model.Jenkins.additionalReadablePaths is a comma-separated list of
additional path prefixes to allow access to.
Credentials stored in plain text by TraceTronic ECU-TEST Plugin
SECURITY-2057 / CVE-2021-21612
TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted
in its global configuration file
de.tracetronic.jenkins.plugins.ecutest.report.atx.installation.ATXInstallation.xml
on the Jenkins controller as part of its configuration.
These credentials can be viewed by users with access to the Jenkins controller
file system.
TraceTronic ECU-TEST Plugin 2.24 adds a new option type for sensitive options.
Previously stored credentials are migrated to that option type on Jenkins
startup.
XSS vulnerability in TICS Plugin
SECURITY-2098 / CVE-2021-21613
TICS Plugin 2020.3.0.6 and earlier does not escape TICS service responses.
This results in a cross-site scripting (XSS) vulnerability exploitable by
attackers able to control TICS service response content.
TICS Plugin 2020.3.0.7 escapes TICS service responses, or strips HTML out, as
appropriate.
Credentials stored in plain text by Bumblebee HP ALM Plugin
SECURITY-2156 / CVE-2021-21614
Bumblebee HP ALM Plugin 4.1.5 and earlier stores credentials unencrypted in its
global configuration file com.agiletestware.bumblebee.BumblebeeGlobalConfig.xml
on the Jenkins controller as part of its configuration.
These credentials can be viewed by users with access to the Jenkins controller
file system.
Bumblebee HP ALM Plugin 4.1.6 stores credentials encrypted once its
configuration is saved again.
Severity
* SECURITY-1452: Medium
* SECURITY-1889: High
* SECURITY-1923: High
* SECURITY-2021: High
* SECURITY-2023: Medium
* SECURITY-2025: Medium
* SECURITY-2035: High
* SECURITY-2047: Low
* SECURITY-2057: Low
* SECURITY-2098: High
* SECURITY-2153: High
* SECURITY-2156: Low
* SECURITY-2171: High
Affected Versions
* Jenkins weekly up to and including 2.274
* Jenkins LTS up to and including 2.263.1
* Bumblebee HP ALM Plugin up to and including 4.1.5
* TICS Plugin up to and including 2020.3.0.6
* TraceTronic ECU-TEST Plugin up to and including 2.23.1
Fix
* Jenkins weekly should be updated to version 2.275
* Jenkins LTS should be updated to version 2.263.2
* Bumblebee HP ALM Plugin should be updated to version 4.1.6
* TICS Plugin should be updated to version 2020.3.0.7
* TraceTronic ECU-TEST Plugin should be updated to version 2.24
These versions include fixes to the vulnerabilities described above. All prior
versions are considered to be affected by these vulnerabilities unless
otherwise indicated.
Credit
The Jenkins project would like to thank the reporters for discovering and
reporting these vulnerabilities:
* Daniel Beck, CloudBees, Inc. for SECURITY-2047, SECURITY-2098,
SECURITY-2153
* Ismail Aydemir at d0nkeysec.org for SECURITY-1923
* Jeff Thompson, CloudBees, Inc., Matt Sicker, CloudBees, Inc., and Wadeck
Follonier, CloudBees, Inc. for SECURITY-1889
* Jesse Glick, CloudBees, Inc. and Wadeck Follonier, CloudBees, Inc. for
SECURITY-2171
* Long Nguyen, Viettel Cyber Security for SECURITY-2057
* Matt Sicker, CloudBees, Inc. and Jesse Glick, CloudBees, Inc. for
SECURITY-2035
* Son Nguyen (@s0nnguy3n_) for SECURITY-2156
* Travis Emmert from Apple Information Security for SECURITY-1452
* Wadeck Follonier, CloudBees, Inc. for SECURITY-2021, SECURITY-2023,
SECURITY-2025
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=69Ci
-----END PGP SIGNATURE-----
ESB-2021.0190 - [Win][UNIX/Linux] Joomla! Core: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0190
Joomla Security Announcements: 20210101, 20210102, 20210103
15 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Joomla! Core
Publisher: Joomla project
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Cross-site Scripting -- Remote with User Interaction
Access Confidential Data -- Unknown/Unspecified
Resolution: Patch/Upgrade
CVE Names: CVE-2021-23125 CVE-2021-23124 CVE-2021-23123
Original Bulletin:
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/R649UlnsWcE/836-20210101-core-com-modules-exposes-module-names.html
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/K1E_p7cgYyI/837-20210102-core-xss-in-mod-breadcrumbs-aria-label-attribute.html
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/bx6liB_wMaw/838-20210103-core-xss-in-com-tags-image-parameters.html
Comment: This bulletin contains three (3) Joomla project security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
[20210101] - Core - com_modules exposes module names
Project: Joomla!
SubProject: CMS
Impact:Â Low
Severity: Low
Versions: 3.0.0 - 3.9.23
Exploit type: Incorrect Access Control
Reported Date: 2020-07-07
Fixed Date: 2021-01-12
CVE Number: CVE-2021-23123
Description
Lack of ACL checks in the order Position endpoint of com_modules leak names
of unpublished and/or inaccessible modules.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.9.23
Solution
Upgrade to version 3.9.24
Contact
The JSST at the Joomla! Security Centre.
Reported By: Phil Taylor
- --------------------------------------------------------------------------------
[20210102] - Core - XSS in mod_breadcrumbs aria-label attribute
Project: Joomla!
SubProject: CMS
Impact: Moderate
Severity: Low
Versions:3.9.0 - 3.9.23
Exploit type: XSS
Reported Date: 2020-09-01
Fixed Date: 2021-01-12
CVE Number: CVE-2021-23124
Description
Lack of escaping in mod_breadcrumbs aria-label attribute allows XSS attacks.
Affected Installs
Joomla! CMS versions 3.9.0 - 3.9.23
Solution
Upgrade to version 3.9.24
Contact
The JSST at the Joomla! Security Centre.
Reported By: Sarunas Paulauskas
- --------------------------------------------------------------------------------
[20210103] - Core - XSS in com_tags image parameters
Project: Joomla!
SubProject: CMS
Impact: Moderate
Severity: Low
Versions:3.1.0 - 3.9.23
Exploit type: XSS
Reported Date: 2020-09-01
Fixed Date: 2021-01-12
CVE Number: CVE-2021-23125
Description
Lack of escaping of image-related parameters in multiple com_tags views
cause lead to XSS attack vectors.
Affected Installs
Joomla! CMS versions 3.1.0 - 3.9.23
Solution
Upgrade to version 3.9.24
Contact
The JSST at the Joomla! Security Centre.
Reported By: Sarunas Paulauskas
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=Zxoc
-----END PGP SIGNATURE-----
ESB-2021.0189 - [SUSE] linux kernel: Multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0189
Security update for the Linux Kernel
15 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: linux kernel
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Root Compromise -- Existing Account
Access Privileged Data -- Existing Account
Modify Arbitrary Files -- Existing Account
Denial of Service -- Existing Account
Access Confidential Data -- Existing Account
Reduced Security -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2020-36158 CVE-2020-29661 CVE-2020-29660
CVE-2020-29373 CVE-2020-29370 CVE-2020-28374
CVE-2020-27830 CVE-2020-27825 CVE-2020-27786
CVE-2020-27777 CVE-2020-27068 CVE-2020-11668
CVE-2020-4788 CVE-2020-0466 CVE-2020-0465
CVE-2020-0444 CVE-2019-20934 CVE-2018-20669
Reference: ESB-2021.0166
ESB-2020.4410
ESB-2020.4275.2
ESB-2020.3888
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210117-1
https://www.suse.com/support/update/announcement/2021/suse-su-20210118-1
Comment: This bulletin contains two (2) SUSE security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0117-1
Rating: moderate
References: #1040855 #1044120 #1044767 #1055117 #1065729 #1094840
#1109695 #1115431 #1138374 #1139944 #1149032 #1152457
#1152472 #1152489 #1155518 #1156315 #1156395 #1158775
#1161099 #1163727 #1165933 #1167657 #1168952 #1171000
#1171078 #1171688 #1172145 #1172733 #1174486 #1175079
#1175480 #1175995 #1176396 #1176942 #1176956 #1177326
#1177500 #1177666 #1177679 #1177733 #1178049 #1178203
#1178270 #1178372 #1178590 #1178612 #1178634 #1178660
#1178756 #1178780 #1179107 #1179204 #1179419 #1179434
#1179435 #1179519 #1179575 #1179578 #1179601 #1179604
#1179639 #1179652 #1179656 #1179670 #1179671 #1179672
#1179673 #1179675 #1179676 #1179677 #1179678 #1179679
#1179680 #1179681 #1179682 #1179683 #1179684 #1179685
#1179687 #1179688 #1179689 #1179690 #1179703 #1179704
#1179707 #1179709 #1179710 #1179711 #1179712 #1179713
#1179714 #1179715 #1179716 #1179745 #1179763 #1179888
#1179892 #1179896 #1179960 #1179963 #1180027 #1180029
#1180031 #1180052 #1180056 #1180086 #1180117 #1180258
#1180261 #1180506 #1180541 #1180559 #1180566
Cross-References: CVE-2020-0444 CVE-2020-0465 CVE-2020-0466 CVE-2020-11668
CVE-2020-27068 CVE-2020-27777 CVE-2020-27786 CVE-2020-27825
CVE-2020-27830 CVE-2020-28374 CVE-2020-29370 CVE-2020-29373
CVE-2020-29660 CVE-2020-29661 CVE-2020-36158
Affected Products:
SUSE Linux Enterprise Workstation Extension 15-SP2
SUSE Linux Enterprise Module for Live Patching 15-SP2
SUSE Linux Enterprise Module for Legacy Software 15-SP2
SUSE Linux Enterprise Module for Development Tools 15-SP2
SUSE Linux Enterprise Module for Basesystem 15-SP2
SUSE Linux Enterprise High Availability 15-SP2
______________________________________________________________________________
An update that solves 15 vulnerabilities and has 98 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security
and bugfixes.
The following security bugs were fixed:
o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
o CVE-2020-36158: Fixed a potential remote code execution in the Marvell
mwifiex driver (bsc#1180559).
o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc
#1179960).
o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl
and ep_loop_check_proc of eventpoll.c (bnc#1180031).
o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check
in the nl80211_policy policy of nl80211.c (bnc#1180086).
o CVE-2020-0444: Fixed a bad kfree due to a logic error in
audit_data_to_entry (bnc#1180027).
o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c
that could have led to local privilege escalation (bnc#1180029).
o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a
use-after-free attack against TIOCSPGRP (bsc#1179745).
o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may
have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction
Services (RTAS) interface, affecting guests running on top of PowerVM or
KVM hypervisors (bnc#1179107).
o CVE-2020-29373: Fixed an unsafe handling of the root directory during path
lookups in fs/io_uring.c (bnc#1179434).
o CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink
camera USB driver (bnc#1168952).
o CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
o CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#
1179435).
o CVE-2020-27786: Fixed a use after free in kernel midi subsystem
snd_rawmidi_kernel_read1() (bsc#1179601).
The following non-security bugs were fixed:
o ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#
SLE-16610).
o ACPI: PNP: compare the string length in the matching_id() (git-fixes).
o ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G
(git-fixes).
o ALSA: core: memalloc: add page alignment for iram (git-fixes).
o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
o ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
o ALSA: hda/hdmi: packet buffer index must be set before reading value
(git-fixes).
o ALSA: hda/proc - print DP-MST connections (git-fixes).
o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
o ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button
(git-fixes).
o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255
(git-fixes).
o ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256
(git-fixes).
o ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model
(git-fixes).
o ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
o ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294
(git-fixes).
o ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14
(git-fixes).
o ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop
(git-fixes).
o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
o ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).
o ALSA: seq: remove useless function (git-fixes).
o ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
o ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
o ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
o ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
o ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
o ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
o ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
o ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
o ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices
(git-fixes).
o ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
o ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
o ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#
1178203).
o ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#
1178203).
o ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
o ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
o ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#
1178203).
o ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
o ALSA: usb-audio: Disable sample read check if firmware does not give back
(git-fixes).
o ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#
1178203).
o ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc
#1178203).
o ALSA: usb-audio: Drop debug.h (bsc#1178203).
o ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
o ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
o ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
o ALSA: usb-audio: Fix control 'access overflow' errors from chmap
(git-fixes).
o ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
o ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
o ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#
1178203).
o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
o ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
o ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#
1178203).
o ALSA: usb-audio: Improve some debug prints (bsc#1178203).
o ALSA: usb-audio: Move device rename and profile quirks to an internal table
(bsc#1178203).
o ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc
#1178203).
o ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#
1178203).
o ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
o ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
o ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
o ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
o ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
o ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
o ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#
1178203).
o ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#
1178203).
o ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
o ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
o ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
o ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
o ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#
1178203).
o ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
o ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
o ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#
1178203).
o ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#
1178203).
o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
o ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo
(bsc#1178203).
o ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
o ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
o ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#
1178203).
o ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
o arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#
SLE-16610).
o ASoC: amd: change clk_get() to devm_clk_get() and add missed checks
(git-fixes).
o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams
(git-fixes).
o ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks
(git-fixes).
o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
o ASoC: meson: fix COMPILE_TEST error (git-fixes).
o ASoC: pcm: DRAIN support reactivation (git-fixes).
o ASoC: SOF: control: fix size checks for ext_bytes control .get()
(git-fixes).
o ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode
(git-fixes).
o ASoC: tegra20-spdif: remove "default m" (git-fixes).
o ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params
(git-fixes).
o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
o ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control()
(git-fixes).
o ath10k: Fix an error handling path (git-fixes).
o ath10k: Release some resources in an error handling path (git-fixes).
o ath6kl: fix enum-conversion warning (git-fixes).
o batman-adv: Consider fragmentation for needed_headroom (git-fixes).
o batman-adv: Do not always reallocate the fragmentation skb head
(git-fixes).
o batman-adv: Reserve needed_*room for fragments (git-fixes).
o blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
o block: return status code in blk_mq_end_request() (bsc#1171000, bsc#
1165933).
o Bluetooth: btmtksdio: Add the missed release_firmware() in
mtk_setup_firmware() (git-fixes).
o Bluetooth: btusb: Add the missed release_firmware() in
btusb_mtk_setup_firmware() (git-fixes).
o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
(git-fixes).
o Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
o bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
o btrfs: add missing check for nocow and compression inode flags (bsc#
1178780).
o btrfs: allow btrfs_truncate_block() to fallback to nocow for data space
reservation (bsc#1161099).
o btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
o btrfs: do not commit logs and transactions during link and rename
operations (bsc#1180566).
o btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc
#1180566).
o btrfs: fix readahead hang and use-after-free after removing a device (bsc#
1179963).
o btrfs: fix use-after-free on readahead extent after failure to create it
(bsc#1179963).
o btrfs: qgroup: do not commit transaction when we already hold the handle
(bsc#1178634).
o btrfs: qgroup: do not try to wait flushing if we're already holding a
transaction (bsc#1179575).
o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
o can: c_can: c_can_power_up(): fix error handling (git-fixes).
o can: sja1000: sja1000_err(): do not count arbitration lose as an error
(git-fixes).
o can: softing: softing_netdev_open(): fix error handling (git-fixes).
o can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error
(git-fixes).
o cfg80211: initialize rekey_data (git-fixes).
o cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
o cifs: do not share tcons with DFS (bsc#1178270).
o cifs: document and cleanup dfs mount (bsc#1178270).
o cifs: ensure correct super block for DFS reconnect (bsc#1178270).
o cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
o cifs: fix check of tcon dfs in smb1 (bsc#1178270).
o cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
o cifs: fix double free error on share and prefix (bsc#1178270).
o cifs: fix leaked reference on requeued write (bsc#1178270).
o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
o cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
o cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#
1178270).
o cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
o cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
o cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
o cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#
1178270).
o cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#
1178270).
o cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
o cifs: rename reconn_inval_dfs_target() (bsc#1178270).
o cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
o clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
o clk: ingenic: Fix divider calculation with div tables (git-fixes).
o clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
o clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
o clk: s2mps11: Fix a resource leak in error handling paths in the probe
function (git-fixes).
o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
o clk: tegra: Do not return 0 on failure (git-fixes).
o clk: tegra: Fix duplicated SE clock entry (git-fixes).
o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
o clocksource/drivers/arm_arch_timer: Correct fault programming of
CNTKCTL_EL1.EVNTI (git-fixes).
o clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne
(git-fixes).
o clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent()
(git-fixes).
o clocksource/drivers/orion: Add missing clk_disable_unprepare() on error
path (git-fixes).
o compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use
(bsc#1178203).
o coredump: fix core_pattern parse error (git-fixes).
o cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
o crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
o crypto: crypto4xx - Replace bitwise OR with logical OR in
crypto4xx_build_pd (git-fixes).
o crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
o crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe
(git-fixes).
o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
o crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
o crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
o crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
o cw1200: fix missing destroy_workqueue() on error in cw1200_init_common
(git-fixes).
o dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe()
(git-fixes).
o drivers: soc: ti: knav_qmss_queue: Fix error return code in
knav_queue_probe (git-fixes).
o drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#
1152489)
o drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting
changes: * context fixes
o drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
o drm/gma500: fix error check (bsc#1152472) Backporting changes: * context
fixes
o drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489)
Backporting changes: * context fixes
o drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: *
context fixes * adapted I/O functions to old driver
o drm/imx: tve remove extraneous type qualifier (bsc#1152489)
o drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#
1152472)
o drm/mediatek: Add missing put_device() call in (bsc#1152472)
o drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#
1152472) Backporting changes: * context fixes * adapted to function layout
o drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
o drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489)
Backporting changes: * context fixes
o drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
o drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472)
Backporting changes: * context fixes
o drm/radeon: Prefer lower feedback dividers (bsc#1152489)
o drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
o drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
o drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting
changes: * context fixes
o drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting
changes: * context fixes
o drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: *
changed filename from vkms_composer.c to vkms_crc.c * context fixes
o drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: *
context fixes
o drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: *
context fixes
o drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
o drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472)
Backporting changes: * context fixes
o drm: rcar-du: Put reference to VSP device (bsc#1152489)
o EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
o EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
o EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#
1152489).
o epoll: Keep a reference on files added to the check list (bsc#1180031).
o ethtool: fix error handling in ethtool_phys_id (git-fixes).
o ext4: correctly report "not supported" for {usr,grp}jquota when !
CONFIG_QUOTA (bsc#1179672).
o ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
o ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
o ext4: limit entries returned when counting fsmap records (bsc#1179671).
o ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#
1179673).
o extcon: max77693: Fix modalias string (git-fixes).
o fail_function: Remove a redundant mutex unlock (bsc#1149032).
o fbcon: Remove the superfluous break (bsc#1152472)
o firmware: arm_sdei: Document the motivation behind these set_fs() calls
(jsc#SLE-16610).
o fix regression in "epoll: Keep a reference on files added to the check
list" (bsc#1180031, git-fixes).
o fs/minix: check return value of sb_getblk() (bsc#1179676).
o fs/minix: do not allow getting deleted inodes (bsc#1179677).
o fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
o fs/minix: reject too-large maximum file size (bsc#1179678).
o fs/minix: remove expected error message in block_to_path() (bsc#1179681).
o fs/minix: set s_maxbytes correctly (bsc#1179679).
o fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
o fs: Do not invalidate page buffers in block_write_full_page() (bsc#
1179711).
o ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
o geneve: pull IP header before ECN decapsulation (git-fixes).
o genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#
1065729).
o genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#
1156315).
o gpio: mvebu: fix potential user-after-free on probe (git-fixes).
o gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
o HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices
(git-fixes).
o HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
o HID: add support for Sega Saturn (git-fixes).
o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
o HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
o HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses
(git-fixes).
o HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo
Edge (git-fixes).
o HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
o HMAT: Register memory-side cache after parsing (bsc#1178660).
o HMAT: Skip publishing target info for nodes with no online memory (bsc#
1178660).
o HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
o i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
o IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
o IB/mlx4: Add and improve logging (bsc#1152489)
o IB/mlx4: Add support for MRA (bsc#1152489)
o IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
o IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
o IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
o IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
o IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
o IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
o ibmvnic: add some debugs (bsc#1179896 ltc#190255).
o ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
o ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#
184239 git-fixes).
o ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098
git-fixes).
o ibmvnic: enhance resetting status check during module exit (bsc#1065729).
o ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853
git-fixes).
o ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855
ltc#155067 git-fixes).
o ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
o ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#
155423 git-fixes).
o ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432
git-fixes).
o iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in
rockchip_saradc_resume (git-fixes).
o iio: buffer: Fix demux update (git-fixes).
o iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
o iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
o iio:imu:bmi160: Fix too large a buffer (git-fixes).
o iio:light:rpr0521: Fix timestamp alignment and prevent data leak
(git-fixes).
o iio:light:st_uvis25: Fix timestamp alignment and prevent data leak
(git-fixes).
o iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
o iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
o inet_ecn: Fix endianness of checksum update when setting ECT(1)
(git-fixes).
o Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
o Input: ads7846 - fix race that causes missing releases (git-fixes).
o Input: ads7846 - fix unaligned access on 7845 (git-fixes).
o Input: cm109 - do not stomp on control URB (git-fixes).
o Input: cros_ec_keyb - send 'scancodes' in addition to key events
(git-fixes).
o Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet
(git-fixes).
o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
o Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
o Input: i8042 - allow insmod to succeed on devices without an i8042
controller (git-fixes).
o Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
o Input: omap4-keypad - fix runtime PM error handling (git-fixes).
o Input: xpad - support Ardwiino Controllers (git-fixes).
o iomap: Clear page error before beginning a write (bsc#1179683).
o iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
o iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
o iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
o iwlwifi: mvm: hook up missing RX handlers (git-fixes).
o iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
o iwlwifi: pcie: limit memory read spin time (git-fixes).
o jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
o kABI workaround for HD-audio generic parser (git-fixes).
o kABI workaround for USB audio driver (bsc#1178203).
o kABI: genirq: add back irq_create_mapping (bsc#1065729).
o kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc
#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
o KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#
1156395).
o lan743x: fix for potential NULL pointer dereference with bare card
(git-fixes).
o libfs: fix error cast of negative value in simple_attr_write() (bsc#
1179709).
o locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#
1149032).
o mac80211: do not set set TDLS STA bandwidth wider than possible
(git-fixes).
o mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#
1163727).
o md-cluster: fix safemode_delay value when converting to clustered bitmap
(bsc#1163727).
o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
o md/cluster: block reshape with remote resync job (bsc#1163727).
o md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
o media: gspca: Fix memory leak in probe (git-fixes).
o media: imx214: Fix stop streaming (git-fixes).
o media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE
(git-fixes).
o media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
o media: ipu3-cio2: Return actual subdev format (git-fixes).
o media: ipu3-cio2: Serialise access to pad format (git-fixes).
o media: ipu3-cio2: Validate mbus format in setting subdev format
(git-fixes).
o media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
o media: msi2500: assign SPI bus number dynamically (git-fixes).
o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm
() (git-fixes).
o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm
() (git-fixes).
o media: mtk-vcodec: add missing put_device() call in
mtk_vcodec_release_dec_pm() (git-fixes).
o media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
o media: siano: fix memory leak of debugfs members in smsdvb_hotplug
(git-fixes).
o media: solo6x10: fix missing snd_card_free in error handling case
(git-fixes).
o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
o media: tm6000: Fix sizeof() mismatches (git-fixes).
o media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#
1180117).
o memstick: fix a double-free bug in memstick_check (git-fixes).
o memstick: r592: Fix error return in r592_probe() (git-fixes).
o mfd: rt5033: Fix errorneous defines (git-fixes).
o mm,memory_failure: always pin the page in madvise_inject_error (bsc#
1180258).
o mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
o mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
o mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault()
(bsc#1179204).
o mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
o mmc: block: Fixup condition for CMD13 polling for RPMB requests
(git-fixes).
o mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
o mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
o mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
o mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
o mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments
(git-fixes).
o mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
o mtd: spinand: Fix OOB read (git-fixes).
o mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
o net/x25: prevent a couple of overflows (bsc#1178590).
o net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
o nfc: s3fwrn5: Release the nfc firmware (git-fixes).
o nvme-fabrics: allow to queue requests for live queues (git-fixes).
o nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#
1179519).
o nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt
context (bsc#1177326).
o nvme-fc: cancel async events before freeing event struct (git-fixes).
o nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#
1177326).
o nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
o nvme-fc: fix io timeout to abort I/O (bsc#1177326).
o nvme-fc: remove err_work work item (bsc#1177326).
o nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
o nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
o nvme-fc: track error_recovery while connecting (bsc#1177326).
o nvme-fc: wait for queues to freeze before calling (git-fixes).
o nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
o nvme-multipath: fix deadlock due to head->lock (git-fixes).
o nvme-pci: properly print controller address (git-fixes).
o nvme-rdma: avoid race between time out and tear down (bsc#1179519).
o nvme-rdma: avoid repeated request completion (bsc#1179519).
o nvme-rdma: cancel async events before freeing event struct (git-fixes).
o nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
o nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#
1179519).
o nvme-rdma: fix timeout handler (bsc#1179519).
o nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
o nvme-rdma: serialize controller teardown sequences (bsc#1179519).
o nvme-tcp: avoid race between time out and tear down (bsc#1179519).
o nvme-tcp: avoid repeated request completion (bsc#1179519).
o nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
o nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
o nvme-tcp: cancel async events before freeing event struct (git-fixes).
o nvme-tcp: do not poll a non-live queue (bsc#1179519).
o nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
o nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
o nvme-tcp: fix possible leakage during error flow (git-fixes).
o nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#
1179519).
o nvme-tcp: fix timeout handler (bsc#1179519).
o nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
o nvme-tcp: leverage request plugging (bsc#1179519).
o nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
o nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
o nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
o nvme-tcp: serialize controller teardown sequences (bsc#1179519).
o nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#
1179519).
o nvme-tcp: try to send request in queue_rq context (bsc#1179519).
o nvme-tcp: use bh_lock in data_ready (bsc#1179519).
o nvme: do not protect ns mutation with ns->head->lock (git-fixes).
o nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
o nvme: introduce nvme_sync_io_queues (bsc#1179519).
o nvme: Revert: Fix controller creation races with teardown (git-fixes).
o nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
o nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
o ocfs2: fix unbalanced locking (bsc#1180506).
o orinoco: Move context allocation after processing the skb (git-fixes).
o PCI: brcmstb: Initialize "tmp" before use (git-fixes).
o PCI: Fix overflow in command-line resource alignment requests (git-fixes).
o PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
o PCI: iproc: Fix out-of-bound array accesses (git-fixes).
o pinctrl: amd: remove debounce filter setting in IRQ type setting
(git-fixes).
o pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
o pinctrl: baytrail: Avoid clearing debounce value when turning it off
(git-fixes).
o pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe()
(git-fixes).
o pinctrl: merrifield: Set default bias in case no particular value given
(git-fixes).
o platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
o platform/x86: acer-wmi: add automatic keyboard background light toggle key
as KEY_LIGHTS_TOGGLE (git-fixes).
o platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init
(git-fixes).
o platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12
(git-fixes).
o platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC
(git-fixes).
o platform/x86: mlx-platform: Fix item counter assignment for MSN2700,
MSN24xx systems (git-fixes).
o platform/x86: mlx-platform: remove an unused variable (git-fixes).
o platform/x86: mlx-platform: Remove PSU EEPROM from default platform
configuration (git-fixes).
o platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform
configuration (git-fixes).
o platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad
Yoga 11e 4th gen (git-fixes).
o platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e
(git-fixes).
o platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet
(git-fixes).
o power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching
(git-fixes).
o power: supply: bq24190_charger: fix reference leak (git-fixes).
o powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc
#1065729).
o powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE
(jsc#SLE-9246 git-fixes).
o powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#
1179888 ltc#190253).
o powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666
git-fixes).
o powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117
ltc#159753 git-fixes bsc#1179888 ltc#190253).
o powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753
git-fixes bsc#1179888 ltc#190253).
o powerpc/bitops: Fix possible undefined behaviour with fls() and fls64()
(bsc#1156395).
o powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
o powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#
189002).
o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#
184630).
o powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#
1179578 ltc#189313).
o powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374
ltc#178199 git-fixes).
o powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
o powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067
git-fixes).
o powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
o powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
o powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#
1065729).
o pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
o pwm: zx: Add missing cleanup in error path (git-fixes).
o qede: Notify qedr when mtu has changed (bsc#1152489)
o qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
o quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
o RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#
1152489)
o RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
o RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
o RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#
1152489)
o RDMA/core: Fix reported speed and width (bsc#1152489)
o RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#
1152489)
o RDMA/core: Free DIM memory in error unwind (bsc#1152489)
o RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
o RDMA/counter: Allow manually bind QPs with different pids to same counter
(bsc#1152489)
o RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
o RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
o RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
o RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
o RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
o RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
o RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
o RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work
(bsc#1152489)
o RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
o RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
o RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
o RDMA/qedr: Fix doorbell setting (bsc#1152489)
o RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
o RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
o RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
o RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
o RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
o RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
o RDMA/qedr: SRQ's bug fixes (bsc#1152489)
o RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
o RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
o RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
o RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#
1152489)
o RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
o RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue
(bsc#1152489)
o RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
o RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
o RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
o RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
o RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
o RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page
boundary (bsc#1152489)
o RDMA/umem: Prevent small pages from being returned by
ib_umem_find_best_pgsz() (bsc#1152489)
o Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#
1180117)
o regmap: Remove duplicate `type` field from regmap `regcache_sync` trace
event (git-fixes).
o regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x
(git-fixes).
o regulator: mcp16502: add linear_min_sel (git-fixes).
o reiserfs: Fix oops during mount (bsc#1179715).
o reiserfs: Initialize inode keys properly (bsc#1179713).
o remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
o remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio()
(git-fixes).
o remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
o rsi: fix error return code in rsi_reset_card() (git-fixes).
o rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time
(git-fixes).
o rtc: hym8563: enable wakeup when applicable (git-fixes).
o rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
o s390/cpuinfo: show processor physical address (git-fixes).
o s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
o s390/qeth: delay draining the TX buffers (git-fixes).
o s390/qeth: fix af_iucv notification race (git-fixes).
o s390/qeth: fix tear down of async TX buffers (git-fixes).
o s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#
190151).
o s390: add 3f program exception handler (git-fixes).
o samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
o samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
o sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
o sched/fair: Fix race between runtime distribution and (git-fixes)
o sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
o sched/fair: Refill bandwidth before scaling (git-fixes)
o sched: correct SD_flags returned by tl->sd_flags() (git-fixes)
o scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
o scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#
1171000).
o scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
o scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
o scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
o scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
o scsi: fnic: Validate io_req before others (bsc#1175079).
o scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional
events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi()
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix removal of SCSI transport device get and put on dev
structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix set but not used warnings from Rework remote port lock
handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler()
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix spelling mistake "Cant" -> "Can't" (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Fix variable 'vport' set but not used in
lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#
1177500).
o scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of
functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#
1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc
#1176942 bsc#1177500).
o scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store()
(bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396
bsc#1176942 bsc#1177500).
o scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480
bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping
it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#
1176396 bsc#1176942 bsc#1177500).
o scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#
1176942 bsc#1177500).
o scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target
and LUN (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Get device objects using sas_address & portID (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc
#1177733).
o scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
o scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#
SLE-16914, bsc#1177733).
o scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914,
bsc#1177733).
o scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc
#1177733).
o scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc
#1177733).
o scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc
#1177733).
o scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#
1177733).
o scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#
1177733).
o scsi: qla2xxx: Change post del message from debug level to log level (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines
(bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry
(bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#
1171688 bsc#1172733).
o scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#
1172733).
o scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
o scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
o scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942
bsc#1177500).
o scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
o scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#
1172733).
o scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#
1165933, bsc#1171000).
o scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc
#1165933).
o selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
o selftests/bpf/test_offload.py: Reset ethtool features after failed setting
(bsc#1155518).
o selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
o selftests/bpf: Print reason when a tester could not run a program (bsc#
1155518).
o serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
o serial_core: Check for port state when tty is in error state (git-fixes).
o slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI
(git-fixes).
o soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
o soc: amlogic: canvas: add missing put_device() call in meson_canvas_get()
(git-fixes).
o soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
o soc: mediatek: Check if power domains can be powered on at boot time
(git-fixes).
o soc: qcom: geni: More properly switch to DMA mode (git-fixes).
o soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
o soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains()
(git-fixes).
o soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
o soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
o speakup: fix uninitialized flush_lock (git-fixes).
o spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
o spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
o spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in
bcm63xx_hsspi_resume (git-fixes).
o spi: davinci: Fix use-after-free on unbind (git-fixes).
o spi: fix resource leak for drivers without .remove callback (git-fixes).
o spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
o spi: mt7621: Disable clock in probe error path (git-fixes).
o spi: mt7621: fix missing clk_disable_unprepare() on error in
mt7621_spi_probe (git-fixes).
o spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
o spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
o spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
o spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
o spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
o spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
o spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path
(git-fixes).
o spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
o spi: synquacer: Disable clock in probe error path (git-fixes).
o spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
o spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
o spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
o staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
o staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe
() (git-fixes).
o thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
o tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
o tty: Fix ->session locking (bsc#1179745).
o ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#
1179703).
o ubifs: Do not parse authentication mount options in remount process (bsc#
1179688).
o ubifs: Fix a memleak after dumping authentication mount options (bsc#
1179687).
o ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#
1179675).
o ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
o ubifs: mount_ubifs: Release authentication resource in error handling path
(bsc#1179689).
o ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#
1179690).
o udf: Fix memory leak when mounting (bsc#1179712).
o usb/max3421: fix return error code in max3421_probe() (git-fixes).
o usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
o usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul
(git-fixes).
o usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe
(git-fixes).
o usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
o usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
o usb: gadget: f_fs: Use local copy of descriptors for userspace copy
(git-fixes).
o usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
o usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
o usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe()
(git-fixes).
o usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
o usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
o usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO
built-in usb-audio card (git-fixes).
o usb: serial: ch341: add new Product ID for CH341A (git-fixes).
o usb: serial: ch341: sort device-id entries (git-fixes).
o usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
o usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
o usb: serial: keyspan_pda: fix stalled writes (git-fixes).
o usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
o usb: serial: keyspan_pda: fix write deadlock (git-fixes).
o usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
o usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
o usb: serial: kl5kusb105: fix memleak on open (git-fixes).
o usb: serial: mos7720: fix parallel-port state restore (git-fixes).
o usb: serial: option: add Fibocom NL668 variants (git-fixes).
o usb: serial: option: add interface-number sanity check to flag handling
(git-fixes).
o usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
o usb: serial: option: fix Quectel BG96 matching (git-fixes).
o usb: UAS: introduce a quirk to set no_write_same (git-fixes).
o usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
o video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
o video: fbdev: sis: fix null ptr dereference (bsc#1152472)
o watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
o watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
o watchdog: Fix potential dereferencing of null pointer (git-fixes).
o watchdog: qcom: Avoid context switch in restart handler (git-fixes).
o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
o watchdog: sprd: change to use usleep_range() instead of busy loop
(git-fixes).
o watchdog: sprd: check busy bit before new loading rather than after that
(git-fixes).
o watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
o wimax: fix duplicate initializer warning (git-fixes).
o x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
o x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
o x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
o x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
o x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes
bytes (bsc#1152489).
o x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
o x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
o x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
o x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc
#1152489).
o x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
o x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#
1152489).
o x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak
(bsc#1152489).
o x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
o x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc
#1152489).
o x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
o x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
(bsc#1152489).
o xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP
(git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Workstation Extension 15-SP2:
zypper in -t patch SUSE-SLE-Product-WE-15-SP2-2021-117=1
o SUSE Linux Enterprise Module for Live Patching 15-SP2:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2021-117=1
o SUSE Linux Enterprise Module for Legacy Software 15-SP2:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2021-117=1
o SUSE Linux Enterprise Module for Development Tools 15-SP2:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-117=1
o SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-117=1
o SUSE Linux Enterprise High Availability 15-SP2:
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2021-117=1
Package List:
o SUSE Linux Enterprise Workstation Extension 15-SP2 (x86_64):
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
kernel-default-extra-5.3.18-24.46.1
kernel-default-extra-debuginfo-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x
x86_64):
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
kernel-default-livepatch-5.3.18-24.46.1
kernel-default-livepatch-devel-5.3.18-24.46.1
kernel-livepatch-5_3_18-24_46-default-1-5.3.1
kernel-livepatch-5_3_18-24_46-default-debuginfo-1-5.3.1
kernel-livepatch-SLE15-SP2_Update_9-debugsource-1-5.3.1
o SUSE Linux Enterprise Module for Legacy Software 15-SP2 (aarch64 ppc64le
s390x x86_64):
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
reiserfs-kmp-default-5.3.18-24.46.1
reiserfs-kmp-default-debuginfo-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le
s390x x86_64):
kernel-obs-build-5.3.18-24.46.1
kernel-obs-build-debugsource-5.3.18-24.46.1
kernel-syms-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 x86_64):
kernel-preempt-debuginfo-5.3.18-24.46.1
kernel-preempt-debugsource-5.3.18-24.46.1
kernel-preempt-devel-5.3.18-24.46.1
kernel-preempt-devel-debuginfo-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch):
kernel-docs-5.3.18-24.46.1
kernel-source-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
x86_64):
kernel-default-5.3.18-24.46.1
kernel-default-base-5.3.18-24.46.1.9.19.1
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
kernel-default-devel-5.3.18-24.46.1
kernel-default-devel-debuginfo-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 x86_64):
kernel-preempt-5.3.18-24.46.1
kernel-preempt-debuginfo-5.3.18-24.46.1
kernel-preempt-debugsource-5.3.18-24.46.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
kernel-devel-5.3.18-24.46.1
kernel-macros-5.3.18-24.46.1
o SUSE Linux Enterprise High Availability 15-SP2 (aarch64 ppc64le s390x
x86_64):
cluster-md-kmp-default-5.3.18-24.46.1
cluster-md-kmp-default-debuginfo-5.3.18-24.46.1
dlm-kmp-default-5.3.18-24.46.1
dlm-kmp-default-debuginfo-5.3.18-24.46.1
gfs2-kmp-default-5.3.18-24.46.1
gfs2-kmp-default-debuginfo-5.3.18-24.46.1
kernel-default-debuginfo-5.3.18-24.46.1
kernel-default-debugsource-5.3.18-24.46.1
ocfs2-kmp-default-5.3.18-24.46.1
ocfs2-kmp-default-debuginfo-5.3.18-24.46.1
References:
o https://www.suse.com/security/cve/CVE-2020-0444.html
o https://www.suse.com/security/cve/CVE-2020-0465.html
o https://www.suse.com/security/cve/CVE-2020-0466.html
o https://www.suse.com/security/cve/CVE-2020-11668.html
o https://www.suse.com/security/cve/CVE-2020-27068.html
o https://www.suse.com/security/cve/CVE-2020-27777.html
o https://www.suse.com/security/cve/CVE-2020-27786.html
o https://www.suse.com/security/cve/CVE-2020-27825.html
o https://www.suse.com/security/cve/CVE-2020-27830.html
o https://www.suse.com/security/cve/CVE-2020-28374.html
o https://www.suse.com/security/cve/CVE-2020-29370.html
o https://www.suse.com/security/cve/CVE-2020-29373.html
o https://www.suse.com/security/cve/CVE-2020-29660.html
o https://www.suse.com/security/cve/CVE-2020-29661.html
o https://www.suse.com/security/cve/CVE-2020-36158.html
o https://bugzilla.suse.com/1040855
o https://bugzilla.suse.com/1044120
o https://bugzilla.suse.com/1044767
o https://bugzilla.suse.com/1055117
o https://bugzilla.suse.com/1065729
o https://bugzilla.suse.com/1094840
o https://bugzilla.suse.com/1109695
o https://bugzilla.suse.com/1115431
o https://bugzilla.suse.com/1138374
o https://bugzilla.suse.com/1139944
o https://bugzilla.suse.com/1149032
o https://bugzilla.suse.com/1152457
o https://bugzilla.suse.com/1152472
o https://bugzilla.suse.com/1152489
o https://bugzilla.suse.com/1155518
o https://bugzilla.suse.com/1156315
o https://bugzilla.suse.com/1156395
o https://bugzilla.suse.com/1158775
o https://bugzilla.suse.com/1161099
o https://bugzilla.suse.com/1163727
o https://bugzilla.suse.com/1165933
o https://bugzilla.suse.com/1167657
o https://bugzilla.suse.com/1168952
o https://bugzilla.suse.com/1171000
o https://bugzilla.suse.com/1171078
o https://bugzilla.suse.com/1171688
o https://bugzilla.suse.com/1172145
o https://bugzilla.suse.com/1172733
o https://bugzilla.suse.com/1174486
o https://bugzilla.suse.com/1175079
o https://bugzilla.suse.com/1175480
o https://bugzilla.suse.com/1175995
o https://bugzilla.suse.com/1176396
o https://bugzilla.suse.com/1176942
o https://bugzilla.suse.com/1176956
o https://bugzilla.suse.com/1177326
o https://bugzilla.suse.com/1177500
o https://bugzilla.suse.com/1177666
o https://bugzilla.suse.com/1177679
o https://bugzilla.suse.com/1177733
o https://bugzilla.suse.com/1178049
o https://bugzilla.suse.com/1178203
o https://bugzilla.suse.com/1178270
o https://bugzilla.suse.com/1178372
o https://bugzilla.suse.com/1178590
o https://bugzilla.suse.com/1178612
o https://bugzilla.suse.com/1178634
o https://bugzilla.suse.com/1178660
o https://bugzilla.suse.com/1178756
o https://bugzilla.suse.com/1178780
o https://bugzilla.suse.com/1179107
o https://bugzilla.suse.com/1179204
o https://bugzilla.suse.com/1179419
o https://bugzilla.suse.com/1179434
o https://bugzilla.suse.com/1179435
o https://bugzilla.suse.com/1179519
o https://bugzilla.suse.com/1179575
o https://bugzilla.suse.com/1179578
o https://bugzilla.suse.com/1179601
o https://bugzilla.suse.com/1179604
o https://bugzilla.suse.com/1179639
o https://bugzilla.suse.com/1179652
o https://bugzilla.suse.com/1179656
o https://bugzilla.suse.com/1179670
o https://bugzilla.suse.com/1179671
o https://bugzilla.suse.com/1179672
o https://bugzilla.suse.com/1179673
o https://bugzilla.suse.com/1179675
o https://bugzilla.suse.com/1179676
o https://bugzilla.suse.com/1179677
o https://bugzilla.suse.com/1179678
o https://bugzilla.suse.com/1179679
o https://bugzilla.suse.com/1179680
o https://bugzilla.suse.com/1179681
o https://bugzilla.suse.com/1179682
o https://bugzilla.suse.com/1179683
o https://bugzilla.suse.com/1179684
o https://bugzilla.suse.com/1179685
o https://bugzilla.suse.com/1179687
o https://bugzilla.suse.com/1179688
o https://bugzilla.suse.com/1179689
o https://bugzilla.suse.com/1179690
o https://bugzilla.suse.com/1179703
o https://bugzilla.suse.com/1179704
o https://bugzilla.suse.com/1179707
o https://bugzilla.suse.com/1179709
o https://bugzilla.suse.com/1179710
o https://bugzilla.suse.com/1179711
o https://bugzilla.suse.com/1179712
o https://bugzilla.suse.com/1179713
o https://bugzilla.suse.com/1179714
o https://bugzilla.suse.com/1179715
o https://bugzilla.suse.com/1179716
o https://bugzilla.suse.com/1179745
o https://bugzilla.suse.com/1179763
o https://bugzilla.suse.com/1179888
o https://bugzilla.suse.com/1179892
o https://bugzilla.suse.com/1179896
o https://bugzilla.suse.com/1179960
o https://bugzilla.suse.com/1179963
o https://bugzilla.suse.com/1180027
o https://bugzilla.suse.com/1180029
o https://bugzilla.suse.com/1180031
o https://bugzilla.suse.com/1180052
o https://bugzilla.suse.com/1180056
o https://bugzilla.suse.com/1180086
o https://bugzilla.suse.com/1180117
o https://bugzilla.suse.com/1180258
o https://bugzilla.suse.com/1180261
o https://bugzilla.suse.com/1180506
o https://bugzilla.suse.com/1180541
o https://bugzilla.suse.com/1180559
o https://bugzilla.suse.com/1180566
- --------------------------------------------------------------------------------
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0118-1
Rating: important
References: #1040855 #1044120 #1044767 #1050242 #1050536 #1050545
#1055117 #1056653 #1056657 #1056787 #1064802 #1065729
#1066129 #1094840 #1103990 #1103992 #1104389 #1104393
#1109695 #1109837 #1110096 #1112178 #1112374 #1115431
#1118657 #1129770 #1136460 #1136461 #1138374 #1139944
#1144912 #1152457 #1163727 #1164780 #1171078 #1172145
#1172538 #1172694 #1174784 #1174852 #1176558 #1176559
#1176956 #1178270 #1178372 #1178401 #1178590 #1178634
#1178762 #1179014 #1179015 #1179045 #1179082 #1179107
#1179142 #1179204 #1179419 #1179444 #1179520 #1179578
#1179601 #1179663 #1179666 #1179670 #1179671 #1179672
#1179673 #1179711 #1179713 #1179714 #1179715 #1179716
#1179722 #1179723 #1179724 #1179745 #1179810 #1179888
#1179895 #1179896 #1179960 #1179963 #1180027 #1180029
#1180031 #1180052 #1180086 #1180117 #1180258 #1180506
#1180559
Cross-References: CVE-2018-20669 CVE-2019-20934 CVE-2020-0444 CVE-2020-0465
CVE-2020-0466 CVE-2020-27068 CVE-2020-27777 CVE-2020-27786
CVE-2020-27825 CVE-2020-28374 CVE-2020-29660 CVE-2020-29661
CVE-2020-36158 CVE-2020-4788
Affected Products:
SUSE Linux Enterprise Workstation Extension 15-SP1
SUSE Linux Enterprise Module for Live Patching 15-SP1
SUSE Linux Enterprise Module for Legacy Software 15-SP1
SUSE Linux Enterprise Module for Development Tools 15-SP1
SUSE Linux Enterprise Module for Basesystem 15-SP1
SUSE Linux Enterprise High Availability 15-SP1
______________________________________________________________________________
An update that solves 14 vulnerabilities and has 77 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security
and bugfixes.
The following security bugs were fixed:
o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
o CVE-2020-36158: Fixed a potential remote code execution in the Marvell
mwifiex driver (bsc#1180559).
o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc
#1179960).
o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl
and ep_loop_check_proc of eventpoll.c (bnc#1180031).
o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check
in the nl80211_policy policy of nl80211.c (bnc#1180086).
o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c
that could have led to local privilege escalation (bnc#1180029).
o CVE-2020-0444: Fixed a bad kfree due to a logic error in
audit_data_to_entry (bnc#1180027).
o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may
have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a
use-after-free attack against TIOCSPGRP (bsc#1179745).
o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction
Services (RTAS) interface, affecting guests running on top of PowerVM or
KVM hypervisors (bnc#1179107).
o CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA
fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#
1179663).
o CVE-2020-27786: Fixed a use after free in kernel midi subsystem
snd_rawmidi_kernel_read1() (bsc#1179601).
The following non-security bugs were fixed:
o ACPI: PNP: compare the string length in the matching_id() (git-fixes).
o ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1
(git-fixes).
o ACPICA: Do not increment operation_region reference counts for field units
(git-fixes).
o ALSA: ca0106: fix error code handling (git-fixes).
o ALSA: ctl: allow TLV read operation for callback type of element in locked
case (git-fixes).
o ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO
(git-fixes).
o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
o ALSA: hda/hdmi: always check pin power status in i915 pin fixup
(git-fixes).
o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
o ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged
(git-fixes).
o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255
(git-fixes).
o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model
(git-fixes).
o ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
o ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation
P520 (git-fixes).
o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294
(git-fixes).
o ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table
(git-fixes).
o ALSA: hda: Fix potential race in unsol event handler (git-fixes).
o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
o ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
o ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
o ALSA: line6: Perform sanity check for each URB creation (git-fixes).
o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
o ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
(git-fixes).
o ALSA: timer: Limit max amount of slave instances (git-fixes).
o ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
o ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
o ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
o ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
o ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S
(git-fixes).
o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S
(git-fixes).
o ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices
(git-fixes).
o ALSA: usb-audio: Disable sample read check if firmware does not give back
(git-fixes).
o ALSA: usb-audio: Fix control 'access overflow' errors from chmap
(git-fixes).
o ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
o ALSA: usb-audio: Fix race against the error recovery URB submission
(git-fixes).
o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams
(git-fixes).
o ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed
(git-fixes).
o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
o ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
o ASoC: pcm: DRAIN support reactivation (git-fixes).
o ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
o ASoC: sti: fix possible sleep-in-atomic (git-fixes).
o ASoC: wm8904: fix regcache handling (git-fixes).
o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
o ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control()
(git-fixes).
o ata/libata: Fix usage of page address by page_address in
ata_scsi_mode_select_xlat function (git-fixes).
o ath10k: Fix an error handling path (git-fixes).
o ath10k: fix backtrace on coredump (git-fixes).
o ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
o ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq
(git-fixes).
o ath10k: Release some resources in an error handling path (git-fixes).
o ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
o ath6kl: fix enum-conversion warning (git-fixes).
o ath9k_htc: Discard undersized packets (git-fixes).
o ath9k_htc: Modify byte order for an error message (git-fixes).
o ath9k_htc: Silence undersized packet warnings (git-fixes).
o ath9k_htc: Use appropriate rs_datalen type (git-fixes).
o Avoid a GCC warning about "/*" within a comment.
o backlight: lp855x: Ensure regulators are disabled on probe failure
(git-fixes).
o Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
o Bluetooth: btusb: Fix detection of some fake CSR controllers with a
bcdDevice val of 0x0134 (git-fixes).
o Bluetooth: Fix advertising duplicated flags (git-fixes).
o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
(git-fixes).
o bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).
o bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#
1050242).
o btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
o btrfs: fix use-after-free on readahead extent after failure to create it
(bsc#1179963).
o btrfs: qgroup: do not commit transaction when we already hold the handle
(bsc#1178634).
o btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
o can: mcp251x: add error check when wq alloc failed (git-fixes).
o can: softing: softing_netdev_open(): fix error handling (git-fixes).
o cfg80211: initialize rekey_data (git-fixes).
o cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
o cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
o cifs: fix check of tcon dfs in smb1 (bsc#1178270).
o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
o cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
o cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code
(git-fixes).
o clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
o clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
o clk: qcom: msm8916: Fix the address location of pll->config_reg
(git-fixes).
o clk: s2mps11: Fix a resource leak in error handling paths in the probe
function (git-fixes).
o clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
o clk: tegra: Fix duplicated SE clock entry (git-fixes).
o clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
o clk: ti: composite: fix memory leak (git-fixes).
o clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
o clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
o coredump: fix core_pattern parse error (git-fixes).
o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe
(git-fixes).
o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
o crypto: talitos - Fix return type