AusCERT - Security Bulletins

Subscribe to AusCERT - Security Bulletins hírcsatorna
Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 1 óra 34 perc
4 óra 34 perc

ESB-2021.0205 - [SUSE] ImageMagick: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0205 Security update for ImageMagick 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ImageMagick Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-29599 CVE-2020-27776 CVE-2020-27775 CVE-2020-27774 CVE-2020-27773 CVE-2020-27772 CVE-2020-27771 CVE-2020-27770 CVE-2020-27769 CVE-2020-27768 CVE-2020-27767 CVE-2020-27766 CVE-2020-27765 CVE-2020-27764 CVE-2020-27763 CVE-2020-27762 CVE-2020-27761 CVE-2020-27760 CVE-2020-27759 CVE-2020-27758 CVE-2020-27757 CVE-2020-27756 CVE-2020-27755 CVE-2020-27754 CVE-2020-27753 CVE-2020-27752 CVE-2020-27751 CVE-2020-27750 CVE-2020-25676 CVE-2020-25675 CVE-2020-25674 CVE-2020-25666 CVE-2020-25665 CVE-2020-25664 CVE-2020-19667 Reference: ESB-2021.0165 ESB-2021.0110 ESB-2021.0038 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210153-1 Comment: This bulletin contains two (2) SUSE security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:14598-1 Rating: moderate References: #1179103 #1179202 #1179212 #1179269 #1179281 #1179311 #1179312 #1179313 #1179315 #1179321 #1179322 #1179327 #1179336 #1179338 #1179339 #1179345 #1179346 #1179347 #1179397 Cross-References: CVE-2020-19667 CVE-2020-25664 CVE-2020-25666 CVE-2020-27751 CVE-2020-27752 CVE-2020-27753 CVE-2020-27754 CVE-2020-27755 CVE-2020-27759 CVE-2020-27760 CVE-2020-27761 CVE-2020-27763 CVE-2020-27765 CVE-2020-27767 CVE-2020-27768 CVE-2020-27769 CVE-2020-27771 CVE-2020-27772 CVE-2020-27775 Affected Products: SUSE Linux Enterprise Server 11-SP4-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 19 vulnerabilities is now available. Description: This update for ImageMagick fixes the following issues: o CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103). o CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc# 1179202). o CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212). o CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269). o CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346). o CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc# 1179397). o CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336). o CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345). o CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268). o CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313). o CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc# 1179281). o CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315). o CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc# 1179312). o CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc# 1179311). o CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322). o CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339). o CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321). o CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327). o CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347). o CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server 11-SP4-LTSS: zypper in -t patch slessp4-ImageMagick-14598=1 o SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-ImageMagick-14598=1 o SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-ImageMagick-14598=1 o SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-ImageMagick-14598=1 Package List: o SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64): libMagickCore1-6.4.3.6-78.135.1 o SUSE Linux Enterprise Server 11-SP4-LTSS (ppc64 s390x x86_64): libMagickCore1-32bit-6.4.3.6-78.135.1 o SUSE Linux Enterprise Point of Sale 11-SP3 (i586): libMagickCore1-6.4.3.6-78.135.1 o SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64): ImageMagick-debuginfo-6.4.3.6-78.135.1 ImageMagick-debugsource-6.4.3.6-78.135.1 o SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): ImageMagick-debuginfo-6.4.3.6-78.135.1 ImageMagick-debugsource-6.4.3.6-78.135.1 References: o https://www.suse.com/security/cve/CVE-2020-19667.html o https://www.suse.com/security/cve/CVE-2020-25664.html o https://www.suse.com/security/cve/CVE-2020-25666.html o https://www.suse.com/security/cve/CVE-2020-27751.html o https://www.suse.com/security/cve/CVE-2020-27752.html o https://www.suse.com/security/cve/CVE-2020-27753.html o https://www.suse.com/security/cve/CVE-2020-27754.html o https://www.suse.com/security/cve/CVE-2020-27755.html o https://www.suse.com/security/cve/CVE-2020-27759.html o https://www.suse.com/security/cve/CVE-2020-27760.html o https://www.suse.com/security/cve/CVE-2020-27761.html o https://www.suse.com/security/cve/CVE-2020-27763.html o https://www.suse.com/security/cve/CVE-2020-27765.html o https://www.suse.com/security/cve/CVE-2020-27767.html o https://www.suse.com/security/cve/CVE-2020-27768.html o https://www.suse.com/security/cve/CVE-2020-27769.html o https://www.suse.com/security/cve/CVE-2020-27771.html o https://www.suse.com/security/cve/CVE-2020-27772.html o https://www.suse.com/security/cve/CVE-2020-27775.html o https://bugzilla.suse.com/1179103 o https://bugzilla.suse.com/1179202 o https://bugzilla.suse.com/1179212 o https://bugzilla.suse.com/1179269 o https://bugzilla.suse.com/1179281 o https://bugzilla.suse.com/1179311 o https://bugzilla.suse.com/1179312 o https://bugzilla.suse.com/1179313 o https://bugzilla.suse.com/1179315 o https://bugzilla.suse.com/1179321 o https://bugzilla.suse.com/1179322 o https://bugzilla.suse.com/1179327 o https://bugzilla.suse.com/1179336 o https://bugzilla.suse.com/1179338 o https://bugzilla.suse.com/1179339 o https://bugzilla.suse.com/1179345 o https://bugzilla.suse.com/1179346 o https://bugzilla.suse.com/1179347 o https://bugzilla.suse.com/1179397 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0153-1 Rating: moderate References: #1179202 #1179208 #1179212 #1179221 #1179223 #1179240 #1179244 #1179260 #1179268 #1179269 #1179276 #1179278 #1179281 #1179285 #1179311 #1179312 #1179313 #1179315 #1179317 #1179321 #1179322 #1179327 #1179333 #1179336 #1179338 #1179339 #1179343 #1179345 #1179346 #1179347 #1179361 #1179362 #1179397 #1179753 Cross-References: CVE-2020-25664 CVE-2020-25665 CVE-2020-25666 CVE-2020-25674 CVE-2020-25675 CVE-2020-25676 CVE-2020-27750 CVE-2020-27751 CVE-2020-27752 CVE-2020-27753 CVE-2020-27754 CVE-2020-27755 CVE-2020-27756 CVE-2020-27757 CVE-2020-27758 CVE-2020-27759 CVE-2020-27760 CVE-2020-27761 CVE-2020-27762 CVE-2020-27763 CVE-2020-27764 CVE-2020-27765 CVE-2020-27766 CVE-2020-27767 CVE-2020-27768 CVE-2020-27769 CVE-2020-27770 CVE-2020-27771 CVE-2020-27772 CVE-2020-27773 CVE-2020-27774 CVE-2020-27775 CVE-2020-27776 CVE-2020-29599 Affected Products: SUSE Linux Enterprise Module for Development Tools 15-SP2 SUSE Linux Enterprise Module for Desktop Applications 15-SP2 ______________________________________________________________________________ An update that fixes 34 vulnerabilities is now available. Description: This update for ImageMagick fixes the following issues: o CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc# 1179202). o CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc# 1179208). o CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212). o CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc #1179223). o CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240). o CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244). o CVE-2020-27750: Fixed a division by zero in MagickCore/colorspace-private.h (bsc#1179260). o CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269). o CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346). o CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346). o CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc# 1179397). o CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345). o CVE-2020-27756: Fixed a division by zero at MagickCore/geometry.c (bsc# 1179221). o CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268). o CVE-2020-27758: Fixed an outside the range of representable values of type 'unsigned long long' (bsc#1179276). o CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313). o CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc# 1179281). o CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315). o CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278). o CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc# 1179312). o CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317). o CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc# 1179311). o CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361). o CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322). o CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339). o CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343). o CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327). o CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347). o CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc# 1179285). o CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc# 1179333). o CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338). o CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362). o CVE-2020-29599: Fixed a shell command injection in -authenticate (bsc# 1179753). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Development Tools 15-SP2: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-153=1 o SUSE Linux Enterprise Module for Desktop Applications 15-SP2: zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-153=1 Package List: o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le s390x x86_64): ImageMagick-debuginfo-7.0.7.34-10.9.1 ImageMagick-debugsource-7.0.7.34-10.9.1 perl-PerlMagick-7.0.7.34-10.9.1 perl-PerlMagick-debuginfo-7.0.7.34-10.9.1 o SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (aarch64 ppc64le s390x x86_64): ImageMagick-7.0.7.34-10.9.1 ImageMagick-config-7-SUSE-7.0.7.34-10.9.1 ImageMagick-config-7-upstream-7.0.7.34-10.9.1 ImageMagick-debuginfo-7.0.7.34-10.9.1 ImageMagick-debugsource-7.0.7.34-10.9.1 ImageMagick-devel-7.0.7.34-10.9.1 libMagick++-7_Q16HDRI4-7.0.7.34-10.9.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-10.9.1 libMagick++-devel-7.0.7.34-10.9.1 libMagickCore-7_Q16HDRI6-7.0.7.34-10.9.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-10.9.1 libMagickWand-7_Q16HDRI6-7.0.7.34-10.9.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-10.9.1 References: o https://www.suse.com/security/cve/CVE-2020-25664.html o https://www.suse.com/security/cve/CVE-2020-25665.html o https://www.suse.com/security/cve/CVE-2020-25666.html o https://www.suse.com/security/cve/CVE-2020-25674.html o https://www.suse.com/security/cve/CVE-2020-25675.html o https://www.suse.com/security/cve/CVE-2020-25676.html o https://www.suse.com/security/cve/CVE-2020-27750.html o https://www.suse.com/security/cve/CVE-2020-27751.html o https://www.suse.com/security/cve/CVE-2020-27752.html o https://www.suse.com/security/cve/CVE-2020-27753.html o https://www.suse.com/security/cve/CVE-2020-27754.html o https://www.suse.com/security/cve/CVE-2020-27755.html o https://www.suse.com/security/cve/CVE-2020-27756.html o https://www.suse.com/security/cve/CVE-2020-27757.html o https://www.suse.com/security/cve/CVE-2020-27758.html o https://www.suse.com/security/cve/CVE-2020-27759.html o https://www.suse.com/security/cve/CVE-2020-27760.html o https://www.suse.com/security/cve/CVE-2020-27761.html o https://www.suse.com/security/cve/CVE-2020-27762.html o https://www.suse.com/security/cve/CVE-2020-27763.html o https://www.suse.com/security/cve/CVE-2020-27764.html o https://www.suse.com/security/cve/CVE-2020-27765.html o https://www.suse.com/security/cve/CVE-2020-27766.html o https://www.suse.com/security/cve/CVE-2020-27767.html o https://www.suse.com/security/cve/CVE-2020-27768.html o https://www.suse.com/security/cve/CVE-2020-27769.html o https://www.suse.com/security/cve/CVE-2020-27770.html o https://www.suse.com/security/cve/CVE-2020-27771.html o https://www.suse.com/security/cve/CVE-2020-27772.html o https://www.suse.com/security/cve/CVE-2020-27773.html o https://www.suse.com/security/cve/CVE-2020-27774.html o https://www.suse.com/security/cve/CVE-2020-27775.html o https://www.suse.com/security/cve/CVE-2020-27776.html o https://www.suse.com/security/cve/CVE-2020-29599.html o https://bugzilla.suse.com/1179202 o https://bugzilla.suse.com/1179208 o https://bugzilla.suse.com/1179212 o https://bugzilla.suse.com/1179221 o https://bugzilla.suse.com/1179223 o https://bugzilla.suse.com/1179240 o https://bugzilla.suse.com/1179244 o https://bugzilla.suse.com/1179260 o https://bugzilla.suse.com/1179268 o https://bugzilla.suse.com/1179269 o https://bugzilla.suse.com/1179276 o https://bugzilla.suse.com/1179278 o https://bugzilla.suse.com/1179281 o https://bugzilla.suse.com/1179285 o https://bugzilla.suse.com/1179311 o https://bugzilla.suse.com/1179312 o https://bugzilla.suse.com/1179313 o https://bugzilla.suse.com/1179315 o https://bugzilla.suse.com/1179317 o https://bugzilla.suse.com/1179321 o https://bugzilla.suse.com/1179322 o https://bugzilla.suse.com/1179327 o https://bugzilla.suse.com/1179333 o https://bugzilla.suse.com/1179336 o https://bugzilla.suse.com/1179338 o https://bugzilla.suse.com/1179339 o https://bugzilla.suse.com/1179343 o https://bugzilla.suse.com/1179345 o https://bugzilla.suse.com/1179346 o https://bugzilla.suse.com/1179347 o https://bugzilla.suse.com/1179361 o https://bugzilla.suse.com/1179362 o https://bugzilla.suse.com/1179397 o https://bugzilla.suse.com/1179753 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATks+NLKJtyKPYoAQirHRAAqU/tzvHcI6BV4B9w/DIH/8Q0vOoLW46c fGmuXIip32ehTSF/672OG2/EasVQT+1AMhrVTDZEsx4f5fKf5bSS+n27h2XRqjKg IfG7i4OBMMKNR5rlwpJuIhHGP9Hqg37C0SMZNWjO+WZvm8BvX9xu4AaJ3W7Qr/5H N9sP12JwHtt/ywKbLKprck81Jp12Uk8/doe2dBuFwymmyWw+EnFmOfRqzH2/0XqC 7MtuaMn6tfo1ZKvQKdLYHTnEyWT0c52hz6VXNxSmBXy8fLyl6obcernTuiDYjVSx JXo7ZSs5aYKTim65Hbhy+BuHGbdhBegNtblTlDE21/OHHB+nQC3o+wWtY2SStMnG b0dBhWsDP5tGYAkHkqT+uPhKOmxfukJiSA/01EPHC1BmweyQbtet01UkIrdanmVp 7Q2veOnwtpsUQJbhFKm0kstX7Cw7B+w4W0yXkskadUCdzt+BzP4nLrisUE1BpaQ/ Buz+QJuwPenvzbraAPNELchLORpga5d2ZhpgTCTCOiz8LQpcLXvVoGv+jeyoFUEz +huVPaSw34Iv1CRtI+tZY7Pf9Hc+sZHRswOct7shILLv8z2G1a9Gp6N2pIE6lArN FFkoj/5WT1hNNRCY6nDxBxl5ugKiaas98MREY4iqsvI8XaPykWP+wDvvGDHPLzma ItylEwNtVf0= =emS7 -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0204 - [SUSE] tcmu-runner: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0204 Security update for tcmu-runner 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tcmu-runner Publisher: SUSE Operating System: SUSE Impact/Access: Provide Misleading Information -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-3139 CVE-2020-28374 Reference: ESB-2021.0189 ESB-2021.0187 ESB-2021.0161 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210143-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for tcmu-runner ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0143-1 Rating: important References: #1138443 #1180676 Cross-References: CVE-2021-3139 Affected Products: SUSE Enterprise Storage 6 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for tcmu-runner fixes the following issue: o CVE-2021-3139: Fixed a LIO security issue (bsc#1180676). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2021-143=1 Package List: o SUSE Enterprise Storage 6 (aarch64 x86_64): libtcmu2-1.4.0-4.3.1 libtcmu2-debuginfo-1.4.0-4.3.1 tcmu-runner-1.4.0-4.3.1 tcmu-runner-debuginfo-1.4.0-4.3.1 tcmu-runner-debugsource-1.4.0-4.3.1 tcmu-runner-handler-rbd-1.4.0-4.3.1 tcmu-runner-handler-rbd-debuginfo-1.4.0-4.3.1 References: o https://www.suse.com/security/cve/CVE-2021-3139.html o https://bugzilla.suse.com/1138443 o https://bugzilla.suse.com/1180676 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATVzONLKJtyKPYoAQj3+xAAqMaLcb5guBnJ3VHhUjHp0Ff5mynYa68B rwpd4OUr5F1KW5rtPtIg1GXoNaKiR7wZTwEFiYiGcEhmEhDTo/UsQdsr6xaIIbzi DC6iT4G3FT0uQ+0jr5JdEMfxKcneaqivMKIrov3fMtdU90yeCrz13Pomu/qRbpre euvejrmQiOmfjI0X3R6whr5TNnk5R8/0Mvfgjau0ptpKAjfotkxIdzXblXHPHuHx hwMuMHmsGybJRo324yrTnGBW3ujtsLEsW0KnPRUFTSVKoa713JGfbgGs1dEwVlO5 rXcDCTC/CdlyKp+dkux5kf/hz1zgjlbc+l9w4Xwlh85Ct2Edkhy4JNCQCd7vJ5Yi aTPRGQ7vsxhd34QpPt7anv96oomvwJsJ6X1JyxVpbTT+jXnn0hGRmvT2QmP1XtyK 7BMby8bOYRV75uV9IXoD5SRoU+RjqIKNXJYXY/zu9qvPQJ7ClEx/Dr9iq6AG1IYM +5v6Tq6M5eNpXPQWrjmiQWExQZ8QQgpWK57jK4jMRaq91otTu3CnH8cnVpV04PMd 7pVhQCUXR8yF4S7PCaxo77QMXRLIZ/0oNM1YoZMjLCCxKtt/o7pGBkdwSRHLoRqz rrVBBq3Lc5YmFZCWR8uHt5x8HHGzFm/yzpYVxF5lTciGxn3l0TaWmtFmvKgklCK1 w77M47uwBPQ= =cFyT -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0202 - [SUSE] slurm_20_02: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0202 Security update for slurm_20_02 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: slurm_20_02 Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-27746 CVE-2020-27745 Reference: ESB-2020.4537 ESB-2020.4501 ESB-2020.4484 ESB-2020.4176 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210139-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for slurm_20_02 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0139-1 Rating: moderate References: #1178890 #1178891 Cross-References: CVE-2020-27745 CVE-2020-27746 Affected Products: SUSE Linux Enterprise Module for HPC 15-SP1 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for slurm_20_02 fixes the following issues: Updated to 20.02.6, addresses two security fixes: * PMIx - fix potential buffer overflows from use of unpackmem(). CVE-2020-27745 (bsc#1178890) * X11 forwarding - fix potential leak of the magic cookie when sent as an argument to the xauth command. CVE-2020-27746 (bsc#1178891) And many other bugfixes, full log and details available at: * https:// lists.schedmd.com/pipermail/slurm-announce/2020/000045.html Updated to 20.02.5, changes: * Fix leak of TRESRunMins when job time is changed with --time-min * pam_slurm - - explicitly initialize slurm config to support configless mode. * scontrol - Fix exit code when creating/updating reservations with wrong Flags. * When a GRES has a no_consume flag, report 0 for allocated. * Fix cgroup cleanup by jobacct_gather/cgroup. * When creating reservations/jobs don't allow counts on a feature unless using an XOR. * Improve number of boards discovery * Fix updating a reservation NodeCnt on a zero-count reservation. * slurmrestd - provide an explicit error messages when PSK auth fails. * cons_tres - fix job requesting single gres per-node getting two or more nodes with less CPUs than requested per-task. * cons_tres - fix calculation of cores when using gres and cpus-per-task. * cons_tres - fix job not getting access to socket without GPU or with less than --gpus-per-socket when not enough cpus available on required socket and not using --gres-flags=enforce binding. * Fix HDF5 type version build error. * Fix creation of CoreCnt only reservations when the first node isn't available. * Fix wrong DBD Agent queue size in sdiag when using accounting_storage/none. * Improve job constraints XOR option logic. * Fix preemption of hetjobs when needed nodes not in leader component. * Fix wrong bit_or() messing potential preemptor jobs node bitmap, causing bad node deallocations and even allocation of nodes from other partitions. * Fix double-deallocation of preempted non-leader hetjob components. * slurmdbd - prevent truncation of the step nodelists over 4095. * Fix nodes remaining in drain state state after rebooting with ASAP option. changes from 20.02.4: * srun - suppress job step creation warning message when waiting on PrologSlurmctld. * slurmrestd - fix incorrect return values in data_list_for_each() functions. * mpi/pmix - fix issue where HetJobs could fail to launch. * slurmrestd - set content-type header in responses. * Fix cons_res GRES overallocation for --gres-flags=disable-binding. * Fix cons_res incorrectly filtering cores with respect to GRES locality for --gres-flags= disable-binding requests. * Fix regression where a dependency on multiple jobs in a single array using underscores would only add the first job. * slurmrestd - - fix corrupted output due to incorrect use of memcpy(). * slurmrestd - address a number of minor Coverity warnings. * Handle retry failure when slurmstepd is communicating with srun correctly. * Fix jobacct_gather possibly duplicate stats when _is_a_lwp error shows up. * Fix tasks binding to GRES which are closest to the allocated CPUs. * Fix AMD GPU ROCM 3.5 support. * Fix handling of job arrays in sacct when querying specific steps. * slurmrestd - avoid fallback to local socket authentication if JWT authentication is ill-formed. * slurmrestd - restrict ability of requests to use different authentication plugins. * slurmrestd - unlink named unix sockets before closing. * slurmrestd - - fix invalid formatting in openapi.json. * Fix batch jobs stuck in CF state on FrontEnd mode. * Add a separate explicit error message when rejecting changes to active node features. * cons_common/job_test - fix slurmctld SIGABRT due to double-free. * Fix updating reservations to set the duration correctly if updating the start time. * Fix update reservation to promiscuous mode. * Fix override of job tasks count to max when ntasks-per-node present. * Fix min CPUs per node not being at least CPUs per task requested. * Fix CPUs allocated to match CPUs requested when requesting GRES and threads per core equal to one. * Fix NodeName config parsing with Boards and without CPUs. * Ensure SLURM_JOB_USER and SLURM_JOB_UID are set in SrunProlog/Epilog. * Fix error messages for certain invalid salloc/sbatch/srun options. * pmi2 - clean up sockets at step termination. * Fix 'scontrol hold' to work with 'JobName'. * sbatch - handle --uid/--gid in #SBATCH directives properly. * Fix race condition in job termination on slurmd. * Print specific error messages if trying to run use certain priority/multifactor factors that cannot work without SlurmDBD. * Avoid partial GRES allocation when --gpus-per-job is not satisfied. * Cray - Avoid referencing a variable outside of it's correct scope when dealing with creating steps within a het job. * slurmrestd - correctly handle larger addresses from accept(). * Avoid freeing wrong pointer with SlurmctldParameters=max_dbd_msg_action with another option after that. * Restore MCS label when suspended job is resumed. * Fix insufficient lock levels. * slurmrestd - use errno from job submission. * Fix "user" filter for sacctmgr show transactions. * Fix preemption logic. * Fix no_consume GRES for exclusive (whole node) requests. * Fix regression in 20.02 that caused an infinite loop in slurmctld when requesting --distribution=plane for the job. * Fix parsing of the --distribution option. * Add CONF READ_LOCK to _handle_fed_send_job_sync. * prep/script - always call slurmctld PrEp callback in _run_script(). * Fix node estimation for jobs that use GPUs or - --cpus-per-task. * Fix jobcomp, job_submit and cli_filter Lua implementation plugins causing slurmctld and/or job submission CLI tools segfaults due to bad return handling when the respective Lua script failed to load. * Fix propagation of gpu options through hetjob components. * Add SLURM_CLUSTERS environment variable to scancel. * Fix packing/unpacking of "unlinked" jobs. * Connect slurmstepd's stderr to srun for steps launched with --pty. * Handle MPS correctly when doing exclusive allocations. * slurmrestd - fix compiling against libhttpparser in a non-default path. * slurmrestd - avoid compilation issues with libhttpparser < 2.6. * Fix compile issues when compiling slurmrestd without --enable-debug. * Reset idle time on a reservation that is getting purged. * Fix reoccurring reservations that have Purge_comp= to keep correct duration if they are purged. * scontrol - changed the "PROMISCUOUS" flag to "MAGNETIC" * Early return from epilog_set_env in case of no_consume. * Fix cons_common/job_test start time discovery logic to prevent skewed results between "will run test" executions. * Ensure TRESRunMins limits are maintained during "scontrol reconfigure". * Improve error message when host lookup fails. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for HPC 15-SP1: zypper in -t patch SUSE-SLE-Module-HPC-15-SP1-2021-139=1 Package List: o SUSE Linux Enterprise Module for HPC 15-SP1 (aarch64 x86_64): libnss_slurm2_20_02-20.02.6-3.16.1 libnss_slurm2_20_02-debuginfo-20.02.6-3.16.1 libpmi0_20_02-20.02.6-3.16.1 libpmi0_20_02-debuginfo-20.02.6-3.16.1 libslurm35-20.02.6-3.16.1 libslurm35-debuginfo-20.02.6-3.16.1 perl-slurm_20_02-20.02.6-3.16.1 perl-slurm_20_02-debuginfo-20.02.6-3.16.1 slurm_20_02-20.02.6-3.16.1 slurm_20_02-auth-none-20.02.6-3.16.1 slurm_20_02-auth-none-debuginfo-20.02.6-3.16.1 slurm_20_02-config-20.02.6-3.16.1 slurm_20_02-config-man-20.02.6-3.16.1 slurm_20_02-debuginfo-20.02.6-3.16.1 slurm_20_02-debugsource-20.02.6-3.16.1 slurm_20_02-devel-20.02.6-3.16.1 slurm_20_02-doc-20.02.6-3.16.1 slurm_20_02-lua-20.02.6-3.16.1 slurm_20_02-lua-debuginfo-20.02.6-3.16.1 slurm_20_02-munge-20.02.6-3.16.1 slurm_20_02-munge-debuginfo-20.02.6-3.16.1 slurm_20_02-node-20.02.6-3.16.1 slurm_20_02-node-debuginfo-20.02.6-3.16.1 slurm_20_02-pam_slurm-20.02.6-3.16.1 slurm_20_02-pam_slurm-debuginfo-20.02.6-3.16.1 slurm_20_02-plugins-20.02.6-3.16.1 slurm_20_02-plugins-debuginfo-20.02.6-3.16.1 slurm_20_02-slurmdbd-20.02.6-3.16.1 slurm_20_02-slurmdbd-debuginfo-20.02.6-3.16.1 slurm_20_02-sql-20.02.6-3.16.1 slurm_20_02-sql-debuginfo-20.02.6-3.16.1 slurm_20_02-sview-20.02.6-3.16.1 slurm_20_02-sview-debuginfo-20.02.6-3.16.1 slurm_20_02-torque-20.02.6-3.16.1 slurm_20_02-torque-debuginfo-20.02.6-3.16.1 slurm_20_02-webdoc-20.02.6-3.16.1 References: o https://www.suse.com/security/cve/CVE-2020-27745.html o https://www.suse.com/security/cve/CVE-2020-27746.html o https://bugzilla.suse.com/1178890 o https://bugzilla.suse.com/1178891 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATVruNLKJtyKPYoAQg+PA/+PWNQOhUtN9QRdOgPSKVu2q0Rt0bmH6fz 7ohEl+jWIRFgymoSqNyh+ZPsjNHmsg2kWif4dlEwFg2xkHvwRd59tuIF2vYOSee+ MhPAY8+hwTVVlFoJsZvodtjMBGaDbQ6lZpDw1ZhELSa0u1o8ybujH1DKG5pLCwWS BYkvzmsIaU1YmdoreY/6nugOyw2Ae/aE43Vy2DZvDfCMqH/nM6+jk/dkDnXQk+uC hwTXbg1eVLfLN2Oe1GS+mwe2mmcsnRlOpRmwmzsCYzzAA3ZpPvrF8l1MADoBqjBP Y/OhEL50emjh8A2kbL7P2kjJ2PlaHShiI1pP7ZZ6CXrf0ZSZRiYKKlSDMsNn+jkI IIF3FK0wlnyuQHsQgnBNb31WUB1pgxPjVcILwI8F3ILjocxl9snpNS/cz0JPpfIu 6Z6V+ZtuKgzuxK4aiVKLoPC9eACQUb9rZIJSJR9TP7BkpidBhWY1l8Whj/ECfx4D pcihm6Ni0DXPqstsC/JnXXAJWyVME2STiCDQkhqHzyFvb/j6TGHnjLaqSHNkwL8e SSD/zPo6CoyxZj55qA/8tymZjNw/Ce47n63CQSJF6/AOys6X0SGWwRd1oODNDD5B D0PILoa1oMlKsxGfnQesM9whQxbA1KrtZISeBJFjoCd6EnfZpZbEmWk2xqwoOTYU xtHiFvLt2u0= =pYju -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0201 - [SUSE] MozillaThunderbird: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0201 Security update for MozillaThunderbird 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MozillaThunderbird Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-16044 Reference: ESB-2021.0158 ESB-2021.0128 ESB-2021.0093 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210122-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210123-1 Comment: This bulletin contains two (2) SUSE security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for MozillaThunderbird ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0122-1 Rating: important References: #1180623 Cross-References: CVE-2020-16044 Affected Products: SUSE Linux Enterprise Workstation Extension 15-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for MozillaThunderbird fixes the following issues: o Mozilla Thunderbird 78.6.1 * changed: MailExtensions: browserAction, composeAction, and messageDisplayAction toolbar buttons now support label and default_label properties (bmo#1583478) * fixed: Running a quicksearch that returned no results did not offer to re-run as a global search (bmo# 1663153) * fixed: Message search toolbar fixes (bmo#1681010) * fixed: Very long subject lines distorted the message compose and display windows, making them unusable (bmo#77806) * fixed: Compose window: Recipient addresses that had not yet been autocompleted were lost when clicking Send button (bmo#1674054) * fixed: Compose window: New message is no longer marked as "changed" just from tabbing out of the recipient field without editing anything (bmo#1681389) * fixed: Account autodiscover fixes when using MS Exchange servers (bmo#1679759) * fixed: LDAP address book stability fix (bmo#1680914) * fixed: Messages with invalid vcard attachments were not marked as read when viewed in the preview window (bmo# 1680468) * fixed: Chat: Could not add TLS certificate exceptions for XMPP connections (bmo#1590471) * fixed: Calendar: System timezone was not always properly detected (bmo#1678839) * fixed: Calendar: Descriptions were sometimes blank when editing a single occurrence of a repeating event (bmo# 1664731) * fixed: Various printing bugfixes (bmo#1676166) * fixed: Visual consistency and theme improvements (bmo#1682808) MFSA 2021-02 (bsc#1180623) * CVE-2020-16044 (bmo#1683964) Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 15-SP1: zypper in -t patch SUSE-SLE-Product-WE-15-SP1-2021-122=1 Package List: o SUSE Linux Enterprise Workstation Extension 15-SP1 (x86_64): MozillaThunderbird-78.6.1-3.116.1 MozillaThunderbird-debuginfo-78.6.1-3.116.1 MozillaThunderbird-debugsource-78.6.1-3.116.1 MozillaThunderbird-translations-common-78.6.1-3.116.1 MozillaThunderbird-translations-other-78.6.1-3.116.1 References: o https://www.suse.com/security/cve/CVE-2020-16044.html o https://bugzilla.suse.com/1180623 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for MozillaThunderbird ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0123-1 Rating: important References: #1180623 Cross-References: CVE-2020-16044 Affected Products: SUSE Linux Enterprise Workstation Extension 15-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for MozillaThunderbird fixes the following issues: o Mozilla Thunderbird 78.6.1 * changed: MailExtensions: browserAction, composeAction, and messageDisplayAction toolbar buttons now support label and default_label properties (bmo#1583478) * fixed: Running a quicksearch that returned no results did not offer to re-run as a global search (bmo# 1663153) * fixed: Message search toolbar fixes (bmo#1681010) * fixed: Very long subject lines distorted the message compose and display windows, making them unusable (bmo#77806) * fixed: Compose window: Recipient addresses that had not yet been autocompleted were lost when clicking Send button (bmo#1674054) * fixed: Compose window: New message is no longer marked as "changed" just from tabbing out of the recipient field without editing anything (bmo#1681389) * fixed: Account autodiscover fixes when using MS Exchange servers (bmo#1679759) * fixed: LDAP address book stability fix (bmo#1680914) * fixed: Messages with invalid vcard attachments were not marked as read when viewed in the preview window (bmo# 1680468) * fixed: Chat: Could not add TLS certificate exceptions for XMPP connections (bmo#1590471) * fixed: Calendar: System timezone was not always properly detected (bmo#1678839) * fixed: Calendar: Descriptions were sometimes blank when editing a single occurrence of a repeating event (bmo# 1664731) * fixed: Various printing bugfixes (bmo#1676166) * fixed: Visual consistency and theme improvements (bmo#1682808) MFSA 2021-02 (bsc#1180623) * CVE-2020-16044 (bmo#1683964) Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-WE-15-SP2-2021-123=1 Package List: o SUSE Linux Enterprise Workstation Extension 15-SP2 (x86_64): MozillaThunderbird-78.6.1-8.6.1 MozillaThunderbird-debuginfo-78.6.1-8.6.1 MozillaThunderbird-debugsource-78.6.1-8.6.1 MozillaThunderbird-translations-common-78.6.1-8.6.1 MozillaThunderbird-translations-other-78.6.1-8.6.1 References: o https://www.suse.com/security/cve/CVE-2020-16044.html o https://bugzilla.suse.com/1180623 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATVnONLKJtyKPYoAQi6KA/9EMTMB9691JXU8nKqSCvH4TkNJ2QOZOPZ fayFAE9Xd9T683hz2C0fHy5n+FCa/SRBNS8eTiaSqOmv4aGZ8Hk5zgYp/FiX0Icr pink4qSnaNL98xLpNeTy40v+SNfF2QA80K1wHyP0xP3MTUhButJWQCAmEUJvfwKK gKarwlXrAENNBboPVX2LpacJsAnlf4XId3sIj+8ZQzlq2vUhLvZGYROdNfFfdOLg qREXZMY/nfSIiGQkrRv8v01VPG90Q2UYOF55Kd5/oeCtCsN+CNnicrRm6QAtX0Fv VR8fzOI25Zv7asmcgOAO7Ql7gyI7peJnlFusdnKvP2xBXuJcBxAuVvbRJj3EjKBg ssfsAo2uyp9IVWSymtPRuB6+f2UYEjIrG5s7l/e54zQsERg3/DAtQA7OBoSpN33s e9qBl1l1oJ2It4dm/M0WffJ/xz9u4yrjcgUh1lwHyLUJDHkv12wKxkaNC1F9/GkC m4gtW7pV1YmpbehhjFTBODZsOsQHJ21AANDs6SpF69K+gTzn71qHsCDXs75nPzi+ hJuyi7XhuRVKo1SsHFKYadTFL6UIsQej+1bHaOeB9a8KPpE5wtSITfaR8iIXpPoZ If0MS699RinLRJE43oq+qcDU6KD/QllNfYtFb6gPcxIVR15z99ptPe+Z/5vuhJiL SytDV8K0YCc= =4rUM -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0200 - [SUSE] open-iscsi: Reduced security - Unknown/unspecified

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0200 Security update for open-iscsi 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: open-iscsi Publisher: SUSE Operating System: SUSE Impact/Access: Reduced Security -- Unknown/Unspecified Resolution: Patch/Upgrade Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210127-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for open-iscsi ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0127-1 Rating: important References: #1179440 #1179908 Affected Products: SUSE Linux Enterprise Module for Basesystem 15-SP2 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This update for open-iscsi fixes the following issues: o Updated to upstream version 2.1.3 as 2.1.3-suse, for bsc#1179908, including: * uip: check for TCP urgent pointer past end of frame * uip: check for u8 overflow when processing TCP options * uip: check for header length underflow during checksum calculation * fwparam_ppc: Fix memory leak in fwparam_ppc.c * iscsiuio: Remove unused macro IFNAMSIZ defined in iscsid_ipc.c * fwparam_ppc: Fix illegal memory access in fwparam_ppc.c * sysfs: Verify parameter of sysfs_device_get() * fwparam_ppc: Fix NULL pointer dereference in find_devtree() * open-iscsi: Clean user_param list when process exit * iscsi_net_util: Fix NULL pointer dereference in find_vlan_dev() * open-iscsi: Fix NULL pointer dereference in mgmt_ipc_read_req() * open-iscsi: Fix invalid pointer deference in find_initiator() * iscsiuio: Fix invalid parameter when call fstat() * iscsi-iname: Verify open() return value before calling read() * iscsi_sysfs: Fix NULL pointer deference in iscsi_sysfs_read_iface o Updatged to latest upstream, including: * iscsiadm: Optimize the the verification of mode paramters * iscsid: Poll timeout value to 1 minute for iscsid * iscsiadm: fix host stats mode coredump * iscsid: fix logging level when starting and shutting down daemon * Updated iscsiadm man page. * Fix memory leak in sysfs_get_str * libopeniscsiusr: Compare with max int instead of max long o Systemd unit files should not depend on network.target (bsc#1179440). o Updated to latest upstream, including async login ability: * Implement login "no_wait" for iscsiadm NODE mode * iscsiadm buffer overflow regression when discovering many targets at once * iscsid: Check Invalid Session id for stop connection * Add ability to attempt target logins asynchronously o %service_del_postun_without_restart is now available on SLE More accurately it's been introduced in SLE12-SP2+ and SLE15+ Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-127=1 Package List: o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): iscsiuio-0.7.8.6-22.6.1 iscsiuio-debuginfo-0.7.8.6-22.6.1 libopeniscsiusr0_2_0-2.1.3-22.6.1 libopeniscsiusr0_2_0-debuginfo-2.1.3-22.6.1 open-iscsi-2.1.3-22.6.1 open-iscsi-debuginfo-2.1.3-22.6.1 open-iscsi-debugsource-2.1.3-22.6.1 open-iscsi-devel-2.1.3-22.6.1 References: o https://bugzilla.suse.com/1179440 o https://bugzilla.suse.com/1179908 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATVkONLKJtyKPYoAQgPqQ//Qrz+7RqIp0kyeqK9QYsD6LW5Mx1npW8R wiE7RZUdRnwrJ06ANlHGpvnyncrggr4WnMbCs4lRhQ3dlH6+ijeluplAbB7Nziyu HWJ+NSAI4E4q40LBT3dTUDFT0lFX1AW8HctxUgq+vtBXhIiUL4OnPPGB0Z3FOUjC BK6Wwc7sZZ8Uonl2ek8KQeRMzcXaDgDaWJ1uh/3YJwA3uWDEo4VkescDG97+VR0r 1uMyj3+kRwilgHvZSBA8bTc9abOdK2AlOfczWtAzqft/8PzCiSKX5EfNrOgjhJRI dM1BUxPzUnBLfZnCzuaBNLiIPFOEOQQHfQegDHvVeUPzcsQ2n8RTFJ1izbDHIoYj C1DpDI30AgkfRlwCzWDYK5uwwB3YNih0e6fs1VE8l+1zfgfxFdKu7XgU7mW5DT0O FiaPuAsYaX+LeN6bqIEP3IpwSzLlx0Lb3/M4NMqxgqD+ziiM2C9vwlhf5UOfgPUv M1Qe41giKOxiov17tv7+cZjwWeHBZU2k4Cz+0bjqXuTYQ89DkMjaYiyMamIw2PWL hg9Ig9hHx01h0grNYXsh/Dv4uZ+JzudiuNgy9in9t7O5CXCPvTBLGu3aac7JCW6U 2AOIOZ5F2aw5+weISpzAlWjuTS4oUvP44C9o9VJXi5gMQCm4LXP15VRqMZkdvfEV atc6WZRcKvw= =DJwW -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0199 - [SUSE] nodejs8: Execute arbitrary code/commands - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0199 Security update for nodejs8 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: nodejs8 Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-8287 Reference: ESB-2021.0160 ESB-2021.0159 ESB-2021.0112 ESB-2021.0111 ESB-2021.0063 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210121-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for nodejs8 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0121-1 Rating: moderate References: #1180554 Cross-References: CVE-2020-8287 Affected Products: SUSE Linux Enterprise Module for Web Scripting 15-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for nodejs8 fixes the following issue: o CVE-2020-8287: Fixed an HTTP request smuggling vulnerability (bsc#1180554). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Web Scripting 15-SP2: zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP2-2021-121=1 Package List: o SUSE Linux Enterprise Module for Web Scripting 15-SP2 (aarch64 ppc64le s390x x86_64): nodejs8-8.17.0-10.6.1 nodejs8-debuginfo-8.17.0-10.6.1 nodejs8-debugsource-8.17.0-10.6.1 nodejs8-devel-8.17.0-10.6.1 npm8-8.17.0-10.6.1 o SUSE Linux Enterprise Module for Web Scripting 15-SP2 (noarch): nodejs8-docs-8.17.0-10.6.1 References: o https://www.suse.com/security/cve/CVE-2020-8287.html o https://bugzilla.suse.com/1180554 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATVc+NLKJtyKPYoAQgwfg/+NbNalV4oRoFwsOUDp657b9pTGkhb3ugp Znr9LWVBcOiLF7IfBNw+t8TNBtWR4Qej3e9fBhyGsvDraNiuqSry3K+UTvTLtYad ch82gZgoiHihfNSDxYS6nXrskU2nyVtPlcF6Cjz8DGUnlvuruSWyXC9/rCoZYcqR t/G5XN+w1vNp5kkzKHK9NG5o2O+ToJzHh51akxeZfCqvYjxZ4ddrtzFe1+cAwQ1e Rw7z4d7AVhXAUHoYv2vkLrEGDRpM2OtuAISxQUHcE/1TcaT0NYPyu/8qReF4e+LS qOgtxNWs/aArF/OYFCuNDJ+KGMD2AKpFeGofMFL4LnALnhBDAor55lCieX60y2xY py2a/kBFGuFYx9AVJssezWSOLQrU+0e2n03jEqqW5m7+qjAlGYda4c9VN+a0xYKW U1IJ8LbgGg0CVXkaSA+IC1lu1KIBwivd6ChIqmWeuJASCTyJv+dHnQ9W3T3Uk2vP BNaN2GelnWhf7UMmS8xq45kZjDUUu084dyWcTlPmOUCompIHRSDeLWdM7phGlqPy AyeJnDP9uQNbhDDBcys0F0B4PQq1U+YPaOA1o8VQPYMndncG7EoU8IKLw+b1uI/L RiuVrhuPW2/DsHN0HwDM/DId+yoRvVVCzJkibUtQc20sS94NCPCMORgK18aL/PIz U6ijleBaexU= =BN9m -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0197 - [Linux][SUSE] php 7, php72, php64: Reduced security - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0197 Security update for php7, php72, php74 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: php7 php72 php74 Publisher: SUSE Operating System: SUSE Linux variants Impact/Access: Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-7071 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210124-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210125-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210126-1 Comment: This bulletin contains three (3) SUSE security advisories. This advisory references vulnerabilities in products which run on platforms other than SUSE. It is recommended that administrators running php7, php72, php74 check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for php7 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0124-1 Rating: moderate References: #1180706 Cross-References: CVE-2020-7071 Affected Products: SUSE Linux Enterprise Module for Web Scripting 15-SP2 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for php7 fixes the following issue: o CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Web Scripting 15-SP2: zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP2-2021-124=1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2: zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-124=1 Package List: o SUSE Linux Enterprise Module for Web Scripting 15-SP2 (aarch64 ppc64le s390x x86_64): apache2-mod_php7-7.4.6-3.14.2 apache2-mod_php7-debuginfo-7.4.6-3.14.2 php7-7.4.6-3.14.2 php7-bcmath-7.4.6-3.14.2 php7-bcmath-debuginfo-7.4.6-3.14.2 php7-bz2-7.4.6-3.14.2 php7-bz2-debuginfo-7.4.6-3.14.2 php7-calendar-7.4.6-3.14.2 php7-calendar-debuginfo-7.4.6-3.14.2 php7-ctype-7.4.6-3.14.2 php7-ctype-debuginfo-7.4.6-3.14.2 php7-curl-7.4.6-3.14.2 php7-curl-debuginfo-7.4.6-3.14.2 php7-dba-7.4.6-3.14.2 php7-dba-debuginfo-7.4.6-3.14.2 php7-debuginfo-7.4.6-3.14.2 php7-debugsource-7.4.6-3.14.2 php7-devel-7.4.6-3.14.2 php7-dom-7.4.6-3.14.2 php7-dom-debuginfo-7.4.6-3.14.2 php7-enchant-7.4.6-3.14.2 php7-enchant-debuginfo-7.4.6-3.14.2 php7-exif-7.4.6-3.14.2 php7-exif-debuginfo-7.4.6-3.14.2 php7-fastcgi-7.4.6-3.14.2 php7-fastcgi-debuginfo-7.4.6-3.14.2 php7-fileinfo-7.4.6-3.14.2 php7-fileinfo-debuginfo-7.4.6-3.14.2 php7-fpm-7.4.6-3.14.2 php7-fpm-debuginfo-7.4.6-3.14.2 php7-ftp-7.4.6-3.14.2 php7-ftp-debuginfo-7.4.6-3.14.2 php7-gd-7.4.6-3.14.2 php7-gd-debuginfo-7.4.6-3.14.2 php7-gettext-7.4.6-3.14.2 php7-gettext-debuginfo-7.4.6-3.14.2 php7-gmp-7.4.6-3.14.2 php7-gmp-debuginfo-7.4.6-3.14.2 php7-iconv-7.4.6-3.14.2 php7-iconv-debuginfo-7.4.6-3.14.2 php7-intl-7.4.6-3.14.2 php7-intl-debuginfo-7.4.6-3.14.2 php7-json-7.4.6-3.14.2 php7-json-debuginfo-7.4.6-3.14.2 php7-ldap-7.4.6-3.14.2 php7-ldap-debuginfo-7.4.6-3.14.2 php7-mbstring-7.4.6-3.14.2 php7-mbstring-debuginfo-7.4.6-3.14.2 php7-mysql-7.4.6-3.14.2 php7-mysql-debuginfo-7.4.6-3.14.2 php7-odbc-7.4.6-3.14.2 php7-odbc-debuginfo-7.4.6-3.14.2 php7-opcache-7.4.6-3.14.2 php7-opcache-debuginfo-7.4.6-3.14.2 php7-openssl-7.4.6-3.14.2 php7-openssl-debuginfo-7.4.6-3.14.2 php7-pcntl-7.4.6-3.14.2 php7-pcntl-debuginfo-7.4.6-3.14.2 php7-pdo-7.4.6-3.14.2 php7-pdo-debuginfo-7.4.6-3.14.2 php7-pgsql-7.4.6-3.14.2 php7-pgsql-debuginfo-7.4.6-3.14.2 php7-phar-7.4.6-3.14.2 php7-phar-debuginfo-7.4.6-3.14.2 php7-posix-7.4.6-3.14.2 php7-posix-debuginfo-7.4.6-3.14.2 php7-readline-7.4.6-3.14.2 php7-readline-debuginfo-7.4.6-3.14.2 php7-shmop-7.4.6-3.14.2 php7-shmop-debuginfo-7.4.6-3.14.2 php7-snmp-7.4.6-3.14.2 php7-snmp-debuginfo-7.4.6-3.14.2 php7-soap-7.4.6-3.14.2 php7-soap-debuginfo-7.4.6-3.14.2 php7-sockets-7.4.6-3.14.2 php7-sockets-debuginfo-7.4.6-3.14.2 php7-sodium-7.4.6-3.14.2 php7-sodium-debuginfo-7.4.6-3.14.2 php7-sqlite-7.4.6-3.14.2 php7-sqlite-debuginfo-7.4.6-3.14.2 php7-sysvmsg-7.4.6-3.14.2 php7-sysvmsg-debuginfo-7.4.6-3.14.2 php7-sysvsem-7.4.6-3.14.2 php7-sysvsem-debuginfo-7.4.6-3.14.2 php7-sysvshm-7.4.6-3.14.2 php7-sysvshm-debuginfo-7.4.6-3.14.2 php7-tidy-7.4.6-3.14.2 php7-tidy-debuginfo-7.4.6-3.14.2 php7-tokenizer-7.4.6-3.14.2 php7-tokenizer-debuginfo-7.4.6-3.14.2 php7-xmlreader-7.4.6-3.14.2 php7-xmlreader-debuginfo-7.4.6-3.14.2 php7-xmlrpc-7.4.6-3.14.2 php7-xmlrpc-debuginfo-7.4.6-3.14.2 php7-xmlwriter-7.4.6-3.14.2 php7-xmlwriter-debuginfo-7.4.6-3.14.2 php7-xsl-7.4.6-3.14.2 php7-xsl-debuginfo-7.4.6-3.14.2 php7-zip-7.4.6-3.14.2 php7-zip-debuginfo-7.4.6-3.14.2 php7-zlib-7.4.6-3.14.2 php7-zlib-debuginfo-7.4.6-3.14.2 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (aarch64 ppc64le s390x x86_64): php7-debuginfo-7.4.6-3.14.2 php7-debugsource-7.4.6-3.14.2 php7-embed-7.4.6-3.14.2 php7-embed-debuginfo-7.4.6-3.14.2 References: o https://www.suse.com/security/cve/CVE-2020-7071.html o https://bugzilla.suse.com/1180706 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for php72 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0125-1 Rating: moderate References: #1180706 Cross-References: CVE-2020-7071 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Module for Web Scripting 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for php72 fixes the following issue: o CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-125=1 o SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2021-125=1 Package List: o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): php72-debuginfo-7.2.5-1.57.1 php72-debugsource-7.2.5-1.57.1 php72-devel-7.2.5-1.57.1 o SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64): apache2-mod_php72-7.2.5-1.57.1 apache2-mod_php72-debuginfo-7.2.5-1.57.1 php72-7.2.5-1.57.1 php72-bcmath-7.2.5-1.57.1 php72-bcmath-debuginfo-7.2.5-1.57.1 php72-bz2-7.2.5-1.57.1 php72-bz2-debuginfo-7.2.5-1.57.1 php72-calendar-7.2.5-1.57.1 php72-calendar-debuginfo-7.2.5-1.57.1 php72-ctype-7.2.5-1.57.1 php72-ctype-debuginfo-7.2.5-1.57.1 php72-curl-7.2.5-1.57.1 php72-curl-debuginfo-7.2.5-1.57.1 php72-dba-7.2.5-1.57.1 php72-dba-debuginfo-7.2.5-1.57.1 php72-debuginfo-7.2.5-1.57.1 php72-debugsource-7.2.5-1.57.1 php72-dom-7.2.5-1.57.1 php72-dom-debuginfo-7.2.5-1.57.1 php72-enchant-7.2.5-1.57.1 php72-enchant-debuginfo-7.2.5-1.57.1 php72-exif-7.2.5-1.57.1 php72-exif-debuginfo-7.2.5-1.57.1 php72-fastcgi-7.2.5-1.57.1 php72-fastcgi-debuginfo-7.2.5-1.57.1 php72-fileinfo-7.2.5-1.57.1 php72-fileinfo-debuginfo-7.2.5-1.57.1 php72-fpm-7.2.5-1.57.1 php72-fpm-debuginfo-7.2.5-1.57.1 php72-ftp-7.2.5-1.57.1 php72-ftp-debuginfo-7.2.5-1.57.1 php72-gd-7.2.5-1.57.1 php72-gd-debuginfo-7.2.5-1.57.1 php72-gettext-7.2.5-1.57.1 php72-gettext-debuginfo-7.2.5-1.57.1 php72-gmp-7.2.5-1.57.1 php72-gmp-debuginfo-7.2.5-1.57.1 php72-iconv-7.2.5-1.57.1 php72-iconv-debuginfo-7.2.5-1.57.1 php72-imap-7.2.5-1.57.1 php72-imap-debuginfo-7.2.5-1.57.1 php72-intl-7.2.5-1.57.1 php72-intl-debuginfo-7.2.5-1.57.1 php72-json-7.2.5-1.57.1 php72-json-debuginfo-7.2.5-1.57.1 php72-ldap-7.2.5-1.57.1 php72-ldap-debuginfo-7.2.5-1.57.1 php72-mbstring-7.2.5-1.57.1 php72-mbstring-debuginfo-7.2.5-1.57.1 php72-mysql-7.2.5-1.57.1 php72-mysql-debuginfo-7.2.5-1.57.1 php72-odbc-7.2.5-1.57.1 php72-odbc-debuginfo-7.2.5-1.57.1 php72-opcache-7.2.5-1.57.1 php72-opcache-debuginfo-7.2.5-1.57.1 php72-openssl-7.2.5-1.57.1 php72-openssl-debuginfo-7.2.5-1.57.1 php72-pcntl-7.2.5-1.57.1 php72-pcntl-debuginfo-7.2.5-1.57.1 php72-pdo-7.2.5-1.57.1 php72-pdo-debuginfo-7.2.5-1.57.1 php72-pgsql-7.2.5-1.57.1 php72-pgsql-debuginfo-7.2.5-1.57.1 php72-phar-7.2.5-1.57.1 php72-phar-debuginfo-7.2.5-1.57.1 php72-posix-7.2.5-1.57.1 php72-posix-debuginfo-7.2.5-1.57.1 php72-pspell-7.2.5-1.57.1 php72-pspell-debuginfo-7.2.5-1.57.1 php72-readline-7.2.5-1.57.1 php72-readline-debuginfo-7.2.5-1.57.1 php72-shmop-7.2.5-1.57.1 php72-shmop-debuginfo-7.2.5-1.57.1 php72-snmp-7.2.5-1.57.1 php72-snmp-debuginfo-7.2.5-1.57.1 php72-soap-7.2.5-1.57.1 php72-soap-debuginfo-7.2.5-1.57.1 php72-sockets-7.2.5-1.57.1 php72-sockets-debuginfo-7.2.5-1.57.1 php72-sodium-7.2.5-1.57.1 php72-sodium-debuginfo-7.2.5-1.57.1 php72-sqlite-7.2.5-1.57.1 php72-sqlite-debuginfo-7.2.5-1.57.1 php72-sysvmsg-7.2.5-1.57.1 php72-sysvmsg-debuginfo-7.2.5-1.57.1 php72-sysvsem-7.2.5-1.57.1 php72-sysvsem-debuginfo-7.2.5-1.57.1 php72-sysvshm-7.2.5-1.57.1 php72-sysvshm-debuginfo-7.2.5-1.57.1 php72-tidy-7.2.5-1.57.1 php72-tidy-debuginfo-7.2.5-1.57.1 php72-tokenizer-7.2.5-1.57.1 php72-tokenizer-debuginfo-7.2.5-1.57.1 php72-wddx-7.2.5-1.57.1 php72-wddx-debuginfo-7.2.5-1.57.1 php72-xmlreader-7.2.5-1.57.1 php72-xmlreader-debuginfo-7.2.5-1.57.1 php72-xmlrpc-7.2.5-1.57.1 php72-xmlrpc-debuginfo-7.2.5-1.57.1 php72-xmlwriter-7.2.5-1.57.1 php72-xmlwriter-debuginfo-7.2.5-1.57.1 php72-xsl-7.2.5-1.57.1 php72-xsl-debuginfo-7.2.5-1.57.1 php72-zip-7.2.5-1.57.1 php72-zip-debuginfo-7.2.5-1.57.1 php72-zlib-7.2.5-1.57.1 php72-zlib-debuginfo-7.2.5-1.57.1 o SUSE Linux Enterprise Module for Web Scripting 12 (noarch): php72-pear-7.2.5-1.57.1 php72-pear-Archive_Tar-7.2.5-1.57.1 References: o https://www.suse.com/security/cve/CVE-2020-7071.html o https://bugzilla.suse.com/1180706 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for php74 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0126-1 Rating: moderate References: #1180706 Cross-References: CVE-2020-7071 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Module for Web Scripting 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for php74 fixes the following issue: o CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-126=1 o SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2021-126=1 Package List: o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): php74-debuginfo-7.4.6-1.16.1 php74-debugsource-7.4.6-1.16.1 php74-devel-7.4.6-1.16.1 o SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64): apache2-mod_php74-7.4.6-1.16.1 apache2-mod_php74-debuginfo-7.4.6-1.16.1 php74-7.4.6-1.16.1 php74-bcmath-7.4.6-1.16.1 php74-bcmath-debuginfo-7.4.6-1.16.1 php74-bz2-7.4.6-1.16.1 php74-bz2-debuginfo-7.4.6-1.16.1 php74-calendar-7.4.6-1.16.1 php74-calendar-debuginfo-7.4.6-1.16.1 php74-ctype-7.4.6-1.16.1 php74-ctype-debuginfo-7.4.6-1.16.1 php74-curl-7.4.6-1.16.1 php74-curl-debuginfo-7.4.6-1.16.1 php74-dba-7.4.6-1.16.1 php74-dba-debuginfo-7.4.6-1.16.1 php74-debuginfo-7.4.6-1.16.1 php74-debugsource-7.4.6-1.16.1 php74-dom-7.4.6-1.16.1 php74-dom-debuginfo-7.4.6-1.16.1 php74-enchant-7.4.6-1.16.1 php74-enchant-debuginfo-7.4.6-1.16.1 php74-exif-7.4.6-1.16.1 php74-exif-debuginfo-7.4.6-1.16.1 php74-fastcgi-7.4.6-1.16.1 php74-fastcgi-debuginfo-7.4.6-1.16.1 php74-fileinfo-7.4.6-1.16.1 php74-fileinfo-debuginfo-7.4.6-1.16.1 php74-fpm-7.4.6-1.16.1 php74-fpm-debuginfo-7.4.6-1.16.1 php74-ftp-7.4.6-1.16.1 php74-ftp-debuginfo-7.4.6-1.16.1 php74-gd-7.4.6-1.16.1 php74-gd-debuginfo-7.4.6-1.16.1 php74-gettext-7.4.6-1.16.1 php74-gettext-debuginfo-7.4.6-1.16.1 php74-gmp-7.4.6-1.16.1 php74-gmp-debuginfo-7.4.6-1.16.1 php74-iconv-7.4.6-1.16.1 php74-iconv-debuginfo-7.4.6-1.16.1 php74-intl-7.4.6-1.16.1 php74-intl-debuginfo-7.4.6-1.16.1 php74-json-7.4.6-1.16.1 php74-json-debuginfo-7.4.6-1.16.1 php74-ldap-7.4.6-1.16.1 php74-ldap-debuginfo-7.4.6-1.16.1 php74-mbstring-7.4.6-1.16.1 php74-mbstring-debuginfo-7.4.6-1.16.1 php74-mysql-7.4.6-1.16.1 php74-mysql-debuginfo-7.4.6-1.16.1 php74-odbc-7.4.6-1.16.1 php74-odbc-debuginfo-7.4.6-1.16.1 php74-opcache-7.4.6-1.16.1 php74-opcache-debuginfo-7.4.6-1.16.1 php74-openssl-7.4.6-1.16.1 php74-openssl-debuginfo-7.4.6-1.16.1 php74-pcntl-7.4.6-1.16.1 php74-pcntl-debuginfo-7.4.6-1.16.1 php74-pdo-7.4.6-1.16.1 php74-pdo-debuginfo-7.4.6-1.16.1 php74-pgsql-7.4.6-1.16.1 php74-pgsql-debuginfo-7.4.6-1.16.1 php74-phar-7.4.6-1.16.1 php74-phar-debuginfo-7.4.6-1.16.1 php74-posix-7.4.6-1.16.1 php74-posix-debuginfo-7.4.6-1.16.1 php74-readline-7.4.6-1.16.1 php74-readline-debuginfo-7.4.6-1.16.1 php74-shmop-7.4.6-1.16.1 php74-shmop-debuginfo-7.4.6-1.16.1 php74-snmp-7.4.6-1.16.1 php74-snmp-debuginfo-7.4.6-1.16.1 php74-soap-7.4.6-1.16.1 php74-soap-debuginfo-7.4.6-1.16.1 php74-sockets-7.4.6-1.16.1 php74-sockets-debuginfo-7.4.6-1.16.1 php74-sodium-7.4.6-1.16.1 php74-sodium-debuginfo-7.4.6-1.16.1 php74-sqlite-7.4.6-1.16.1 php74-sqlite-debuginfo-7.4.6-1.16.1 php74-sysvmsg-7.4.6-1.16.1 php74-sysvmsg-debuginfo-7.4.6-1.16.1 php74-sysvsem-7.4.6-1.16.1 php74-sysvsem-debuginfo-7.4.6-1.16.1 php74-sysvshm-7.4.6-1.16.1 php74-sysvshm-debuginfo-7.4.6-1.16.1 php74-tidy-7.4.6-1.16.1 php74-tidy-debuginfo-7.4.6-1.16.1 php74-tokenizer-7.4.6-1.16.1 php74-tokenizer-debuginfo-7.4.6-1.16.1 php74-xmlreader-7.4.6-1.16.1 php74-xmlreader-debuginfo-7.4.6-1.16.1 php74-xmlrpc-7.4.6-1.16.1 php74-xmlrpc-debuginfo-7.4.6-1.16.1 php74-xmlwriter-7.4.6-1.16.1 php74-xmlwriter-debuginfo-7.4.6-1.16.1 php74-xsl-7.4.6-1.16.1 php74-xsl-debuginfo-7.4.6-1.16.1 php74-zip-7.4.6-1.16.1 php74-zip-debuginfo-7.4.6-1.16.1 php74-zlib-7.4.6-1.16.1 php74-zlib-debuginfo-7.4.6-1.16.1 References: o https://www.suse.com/security/cve/CVE-2020-7071.html o https://bugzilla.suse.com/1180706 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATVU+NLKJtyKPYoAQilJhAAqiw0HIMK8wcIJVbrMeyTkdJ1mBUvt98q KwDFrqmoGc90LiU4kaInc7Jg3JTuqNaiakEm5+FrJRHEX8mNKabSHoYqmNenOZG8 k5MhuDMxPhnS2hI4SJrRzAdywnD1cLNpVXc2bV2Q3anZTeS1ixSovinRDDHQ533F VOg907NPqbFN2UlpABqn5J5pvFDMGujZS7fxuywzDoD5o0FZW6AYCanjFwki4DtV cs5i0POsv65GLdOtEpFsyhqT8tUEnQ6pm1fsfUVETz4qWXFN3Q7eCsmut9gk8VtI kYaIJaGcer8ICOXthaJxCohekY2UOD0PTdFSU8AyOdtJx7TDlA0wNXWIPYZutdRb 0SIm9kV0QpH7DQbqwNAJxLLbSc40m5tNqQ4jOU8w9Qo2+6VWhuFrsQtrRpIXKsWU 55WQXSz1PuzIFwOfRBYwlcb5PrXnNyT029QDoRz9uAIpGX4EdjJN+NwshREaEiNI KwN1KsncbMe9zy5nsFWRNV4yi5/4F1TpRwyUCAItbn6b0Q7X9efrHd/Zkx/SLgr6 6K0qMLs06ijxr2saOfORsOYoz525UZ4u9VYSWVce8YWs4QEl9MUY1Q9SrmVvDSMb XAfB6hFRdot1J3bFN+mql49b1+OfuXipiu5s4IczO7Nebh6eloMOtfcjboy/PN2E 47xl1SCTQ14= =SWZ1 -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0196 - [SUSE] openldap2: Denial of service - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0196 SUSE Security Update: Security update for openldap2 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: openldap2 Publisher: SUSE Operating System: SUSE Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-25710 CVE-2020-25709 Reference: ESB-2020.4187 ESB-2020.4077 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210142-1 https://www.suse.com/support/update/announcement/2021/suse-su-202114597-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210129-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210128-1 Comment: This bulletin contains four (4) SUSE security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for openldap2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0142-1 Rating: moderate References: #1178909 Cross-References: CVE-2020-25709 CVE-2020-25710 Affected Products: SUSE Linux Enterprise Server for SAP 12-SP5 SUSE Linux Enterprise Server for SAP 12-SP4 SUSE Linux Enterprise Server for SAP 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP2 SUSE Linux Enterprise Module for Legacy Software 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for openldap2 fixes the following issues: o CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909). o CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 12-SP5: zypper in -t patch SUSE-SLE-SAP-12-SP5-2021-142=1 o SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-142=1 o SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-142=1 o SUSE Linux Enterprise Server for SAP 12-SP2: zypper in -t patch SUSE-SLE-SAP-12-SP2-2021-142=1 o SUSE Linux Enterprise Module for Legacy Software 12: zypper in -t patch SUSE-SLE-Module-Legacy-12-2021-142=1 Package List: o SUSE Linux Enterprise Server for SAP 12-SP5 (ppc64le x86_64): compat-libldap-2_3-0-2.3.37-18.24.26.1 compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1 o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): compat-libldap-2_3-0-2.3.37-18.24.26.1 compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1 o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): compat-libldap-2_3-0-2.3.37-18.24.26.1 compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1 o SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64): compat-libldap-2_3-0-2.3.37-18.24.26.1 compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1 o SUSE Linux Enterprise Module for Legacy Software 12 (aarch64 ppc64le s390x x86_64): compat-libldap-2_3-0-2.3.37-18.24.26.1 compat-libldap-2_3-0-debuginfo-2.3.37-18.24.26.1 References: o https://www.suse.com/security/cve/CVE-2020-25709.html o https://www.suse.com/security/cve/CVE-2020-25710.html o https://bugzilla.suse.com/1178909 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for openldap2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:14597-1 Rating: moderate References: #1178909 Cross-References: CVE-2020-25709 CVE-2020-25710 Affected Products: SUSE Linux Enterprise Server 11-SECURITY ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for openldap2 fixes the following issues: o CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909). o CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server 11-SECURITY: zypper in -t patch secsp3-openldap2-14597=1 Package List: o SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64): libldap-openssl1-2_4-2-2.4.26-0.74.19.1 openldap2-client-openssl1-2.4.26-0.74.19.1 openldap2-openssl1-2.4.26-0.74.19.1 o SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64): libldap-openssl1-2_4-2-32bit-2.4.26-0.74.19.1 o SUSE Linux Enterprise Server 11-SECURITY (ia64): libldap-openssl1-2_4-2-x86-2.4.26-0.74.19.1 References: o https://www.suse.com/security/cve/CVE-2020-25709.html o https://www.suse.com/security/cve/CVE-2020-25710.html o https://bugzilla.suse.com/1178909 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for openldap2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0129-1 Rating: moderate References: #1178909 #1179503 Cross-References: CVE-2020-25709 CVE-2020-25710 Affected Products: SUSE Linux Enterprise Module for Legacy Software 15-SP2 SUSE Linux Enterprise Module for Development Tools 15-SP2 SUSE Linux Enterprise Module for Basesystem 15-SP2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for openldap2 fixes the following issues: Security issues fixed: o CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909). o CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909). Non-security issue fixed: o Retry binds in the LDAP backend when the remote LDAP server disconnected the (idle) LDAP connection. (bsc#1179503) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Legacy Software 15-SP2: zypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2021-129=1 o SUSE Linux Enterprise Module for Development Tools 15-SP2: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-129=1 o SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-129=1 Package List: o SUSE Linux Enterprise Module for Legacy Software 15-SP2 (aarch64 ppc64le s390x x86_64): openldap2-2.4.46-9.45.1 openldap2-back-meta-2.4.46-9.45.1 openldap2-back-meta-debuginfo-2.4.46-9.45.1 openldap2-back-perl-2.4.46-9.45.1 openldap2-back-perl-debuginfo-2.4.46-9.45.1 openldap2-debuginfo-2.4.46-9.45.1 openldap2-debugsource-2.4.46-9.45.1 openldap2-ppolicy-check-password-1.2-9.45.1 openldap2-ppolicy-check-password-debuginfo-1.2-9.45.1 o SUSE Linux Enterprise Module for Development Tools 15-SP2 (x86_64): openldap2-debugsource-2.4.46-9.45.1 openldap2-devel-32bit-2.4.46-9.45.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): libldap-2_4-2-2.4.46-9.45.1 libldap-2_4-2-debuginfo-2.4.46-9.45.1 openldap2-client-2.4.46-9.45.1 openldap2-client-debuginfo-2.4.46-9.45.1 openldap2-debugsource-2.4.46-9.45.1 openldap2-devel-2.4.46-9.45.1 openldap2-devel-static-2.4.46-9.45.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch): libldap-data-2.4.46-9.45.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64): libldap-2_4-2-32bit-2.4.46-9.45.1 libldap-2_4-2-32bit-debuginfo-2.4.46-9.45.1 References: o https://www.suse.com/security/cve/CVE-2020-25709.html o https://www.suse.com/security/cve/CVE-2020-25710.html o https://bugzilla.suse.com/1178909 o https://bugzilla.suse.com/1179503 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for openldap2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0128-1 Rating: moderate References: #1178909 Cross-References: CVE-2020-25709 CVE-2020-25710 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Server 12-SP5 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for openldap2 fixes the following issues: o CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909). o CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-128=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-128=1 Package List: o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): openldap2-back-perl-2.4.41-18.80.1 openldap2-back-perl-debuginfo-2.4.41-18.80.1 openldap2-debuginfo-2.4.41-18.80.1 openldap2-debugsource-2.4.41-18.80.1 openldap2-devel-2.4.41-18.80.1 openldap2-devel-static-2.4.41-18.80.1 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): libldap-2_4-2-2.4.41-18.80.1 libldap-2_4-2-debuginfo-2.4.41-18.80.1 openldap2-2.4.41-18.80.1 openldap2-back-meta-2.4.41-18.80.1 openldap2-back-meta-debuginfo-2.4.41-18.80.1 openldap2-client-2.4.41-18.80.1 openldap2-client-debuginfo-2.4.41-18.80.1 openldap2-debuginfo-2.4.41-18.80.1 openldap2-debugsource-2.4.41-18.80.1 openldap2-ppolicy-check-password-1.2-18.80.1 openldap2-ppolicy-check-password-debuginfo-1.2-18.80.1 o SUSE Linux Enterprise Server 12-SP5 (s390x x86_64): libldap-2_4-2-32bit-2.4.41-18.80.1 libldap-2_4-2-debuginfo-32bit-2.4.41-18.80.1 o SUSE Linux Enterprise Server 12-SP5 (noarch): openldap2-doc-2.4.41-18.80.1 References: o https://www.suse.com/security/cve/CVE-2020-25709.html o https://www.suse.com/security/cve/CVE-2020-25710.html o https://bugzilla.suse.com/1178909 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATVOuNLKJtyKPYoAQg2Aw//QUjiwxg38nYLOIxt23RIi+iiSvgw0OPX XQZLvxyLIZmz20HFBBHydlQusWjy1A97TpmIBqm894+4vebJe1zJ7yVlRWdasSLE 9vxJblZ8jIrEgIqdSiaOZ5BSp1QQrRT4w0VgZy7gff/MZE8CeW8IBcEtZWmV8KpG hVAUcC9a/aTWJNI0elhSw/5Q9QZV0XBonQkQ+6yZrzgVUsaKQg9EsV6D219zBCVo G0YQNOSM/GREIsoNU78WBk0dBxUgpoB1oqe48xcsrFVWQM29sT1JKdIUBiJq/2xr KrG21Sk19stPOl6wZm1mv/1faqdl2kSwZZVn0wvKNAQNPxM+POAMfIjZ4HlNlV6O 1eFlDClDLbZS9bxk+HJiwiykbl5NDumlgnpCRmUi/gLQtEhmIkK2SrQk0y+/fEy0 2VeUK+pIGMVBVZOuAOxIs5vgpOAHhfHjgXgImnD8dzcgCixwEiqBHM8PNlPpatAe meqDpLZHzMU4khe4a/Nh60jVomzG9RuXLUC1r6ihUCRErEmz7L7Bjxe/7W0YufYa yv7ZINmUnWUbIg+llBtTzsIQ4nX2Jplt69GL4YKZmJdYNXWv2q9iy/33JdU6uBCJ YLLYuE95c6q1YXT7nvmktdsudhkXe6QFmEZ4+PSpvlGLFoOikulIXUppdmCcCGty Iis7T6DP2fo= =G111 -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0203 - [Juniper] Junos OS: Denial of service - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0203 JSA11107 - 2021-01 Security Bulletin: Junos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets (CVE-2021-0217) 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Junos OS Publisher: Juniper Networks Operating System: Juniper Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-0217 Original Bulletin: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11107 - --------------------------BEGIN INCLUDED TEXT-------------------- 2021-01 Security Bulletin: Junos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets (CVE-2021-0217) Article ID : JSA11107 Last Updated: 15 Jan 2021 Version : 2.0 Product Affected: This issue affects Junos OS 17.4R3, 18.1R3, 18.2R3, 18.3R3, 18.4R2, 18.4R3, 19.1, 19.2, 19.3, 19.4, 20.1, 20.2. Affected platforms: EX Series, QFX Series. Problem: A vulnerability in processing of certain DHCP packets from adjacent clients on EX Series and QFX Series switches running Juniper Networks Junos OS with DHCP local/relay server configured may lead to exhaustion of DMA memory causing a Denial of Service (DoS). Over time, exploitation of this vulnerability may cause traffic to stop being forwarded, or to crashing of the fxpc process. When Packet DMA heap utilization reaches 99%, the system will become unstable. Packet DMA heap utilization can be monitored through the following command: user@junos# request pfe execute target fpc0 timeout 30 command "show heap" ID Base Total(b) Free(b) Used(b) % Name - -- ---------- ----------- ----------- ----------- --- ----------- 0 213301a8 536870488 387228840 149641648 27 Kernel 1 91800000 8388608 3735120 4653488 55 DMA 2 92000000 75497472 74452192 1045280 1 PKT DMA DESC 3 d330000 335544320 257091400 78452920 23 Bcm_sdk 4 96800000 184549376 2408 184546968 99 Packet DMA 5 903fffe0 20971504 20971504 0 0 Blob An indication of the issue occurring may be observed through the following log messages: Dec 10 08:07:00.124 2020 hostname fpc0 brcm_pkt_buf_alloc:523 (buf alloc) failed allocating packet buffer Dec 10 08:07:00.126 2020 hostname fpc0 (buf alloc) failed allocating packet buffer Dec 10 08:07:00.128 2020 hostname fpc0 brcm_pkt_buf_alloc:523 (buf alloc) failed allocating packet buffer Dec 10 08:07:00.130 2020 hostnameC fpc0 (buf alloc) failed allocating packet buffer This issue affects Juniper Networks Junos OS on EX Series and QFX Series: o 17.4R3 versions prior to 17.4R3-S3; o 18.1R3 versions between 18.1R3-S6 and 18.1R3-S11; o 18.2R3 versions prior to 18.2R3-S6; o 18.3R3 versions prior to 18.3R3-S4; o 18.4R2 versions prior to 18.4R2-S5; o 18.4R3 versions prior to 18.4R3-S6; o 19.1 versions between 19.1R2 and 19.1R3-S3; o 19.2 versions prior to 19.2R3-S1; o 19.3 versions prior to 19.3R2-S5, 19.3R3; o 19.4 versions prior to 19.4R2-S2, 19.4R3; o 20.1 versions prior to 20.1R2; o 20.2 versions prior to 20.2R1-S2, 20.2R2. Junos OS versions prior to 17.4R3 are unaffected by this vulnerability. The following configuration snippet enables the DHCP relay forwarding option: [forwarding-options dhcp-relay] Juniper SIRT is not aware of any malicious exploitation of this vulnerability. This issue was seen during production usage. This issue has been assigned CVE-2021-0217 . Solution: The following software releases have been updated to resolve this specific issue: Junos OS 17.4R3-S3, 18.1R3-S11, 18.2R3-S6, 18.3R3-S4, 18.4R2-S5, 18.4R3-S6, 19.1R1-S6, 19.1R3-S3, 19.2R3-S1, 19.3R2-S5, 19.3R3, 19.4R2-S2, 19.4R3, 20.1R2, 20.2R1-S2, 20.2R2, 20.3R1, and all subsequent releases. This issue is being tracked as 1514145 . Workaround: There are no available workarounds for this issue. Implementation: Software releases or updates are available for download at https:// www.juniper.net/support/downloads/ . Modification History: 2021-01-13: Initial Publication. 2021-01-15: Removed redundant 18.4R2-S7 fixed release from SOLUTION field. CVSS Score: 7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) Severity Level: High Severity Assessment: Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATUY+NLKJtyKPYoAQiFJA/9GghG3wix8C8jgD1gX+6BkgRSz/JShd2/ 9l88oOrab8Ii7gYxOF23H1qOeOMj3gOB1eAMw3zUns3PcGwP/SKx3xgY1BJjDQw2 NbPl01l8zPW2n71MedmBQsOp5qq1F43NKGh4L6lxYlDjXoT4/67kiozSSDjEs8jK jF3AA7N37ziLd+LnaYIYdwHleG+WBSGTfaDtH/8MbT7kEhjrV5yroRhj0DAwmfRl LRh9AjMQ5sioyXoZsTy39Fa/MFjiG1cyTebca9ejHlYV5KhKJZrEwJZpvvHGY/+i SjIIWh8dPNChJBYKUBjbhVSdmBQes9S/GNubz087zBO9aoewCw4XSpk1rz3IBczI 4C7WHDo5OTmMcrnVH4Ba1kk8S+0K6ObFfdyf11FSqNsvebfSDgA114UYfhbYDd55 w2QfwWn0I7Zg5NTQ4yq0eTvqvuauAEiofNeIhCPSq34VHtKjvzS7DluJGgHPQmvs WjVsnzZTG6QZZoLN8vauAvC0htkqFRiOOEC2ZFfGpdZGcyK/Ftv4KOrPaLRH9iGy tP6SDnQuLAXpEhY1xbzGyae1XBy1NKZCjXomdcXIZQIVJmre9gm9Pu7ShX5o+rBL 5tbuuJqU9BpB2zbPA/3JULnJGB6QR+CfPoGuRXp6/39f4XvF8Vvl9GQd1qSsigNf peVQRGdle1E= =75dK -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0198 - [Ubuntu] Ampache: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0198 USN-4693-1: Ampache vulnerabilities 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Ampache Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Administrator Compromise -- Existing Account Cross-site Scripting -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-12386 CVE-2019-12385 Reference: ESB-2019.4240 Original Bulletin: https://ubuntu.com/security/notices/USN-4693-1 - --------------------------BEGIN INCLUDED TEXT-------------------- USN-4693-1: Ampache vulnerabilities 14 January 2021 Several security issues were fixed in Ampache. Releases o Ubuntu 16.04 LTS Packages o ampache - web-based audio file management system Details It was discovered that an SQL injection vulnerability exists in the Ampache search engine. Any user able to perform searches could dump any data contained in the database. An attacker could use this to disclose sensitive information. (CVE-2019-12385) It was discovered that an XSS vulnerability in Ampache. An attacker could use this vulnerability to force an admin to create a new privileged user. (CVE-2019-12386) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 o ampache - 3.6-rzb2779+dfsg-0ubuntu9.2 o ampache-common - 3.6-rzb2779+dfsg-0ubuntu9.2 After a standard system update you need to restart ampache to make all the necessary changes. References o CVE-2019-12386 o CVE-2019-12385 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATUHuNLKJtyKPYoAQhD2Q/+NiR2mSHIR+vB/EiYa4KTg0Dg7FTahuzg +KiWwqONa/26qLo2QC8WD9V5h9QPl8cQiydkEv4NjdclNjPErBE4Pv2JMhvqBb4m dDTg9cTzm288bJzieTgAv1S8kvsX7A2RIuzufgGTFAfF1bAXku8TcxzhR/y7i5ZP aWx+bPh4Z8SjfiOI/UklDPoPRZWPDedo9+toIcufIipwPebTCDGY9fcQbSaw4Ynh neWM+alrEozX25y+MVGchZbVut8YaALZP+SmPzqeJAd7PAfojPZIG7cVxSaVZMsf YNx96OxgvnYyVs0iU41YD79AZhp5rjMAoUxRIqq5RlFIIhMngMPJaSLWBWRHhjEG y3Bs6zoq/AWA9jz/HwaAVDDfvgYfTPxiTqkty1cTptrXZRiqmHMiU74loebXxNcg xt4NoUerKlpduTT0wj2zo2NM6XTePh5ypDwbO183E/MVTOMBeTMhbU/HeIapL93b g6P73FNT3FTjTXxgNcH7v4rMxIe06H4+wdFcEnL9qEG1ogPA0Hveo3aqJJ3Qiw0+ XWCJrEYldUIm/PHlCqIv928GzWwufQlGm2i7Q2gjjt/YCUbyV8WrO8gUelELXYgl klyvek9LIvDVUFOsFs02V1Lrr2BhoMskT5f9iYOp+k3nK2Ixm3aq0r+fbHt1hzRt sOMc1qGo6+g= =umBY -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0195 - [Debian] wavpack: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0195 wavpack security update 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: wavpack Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-35738 CVE-2019-1010319 CVE-2019-1010317 CVE-2019-1010315 CVE-2019-11498 CVE-2018-19841 CVE-2018-19840 Reference: ESB-2021.0062 ESB-2020.1522 Original Bulletin: https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2525-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Utkarsh Gupta January 15, 2021 https://wiki.debian.org/LTS - - ----------------------------------------------------------------------- Package : wavpack Version : 5.0.0-2+deb9u3 CVE ID : CVE-2018-19840 CVE-2018-19841 CVE-2019-11498 CVE-2019-1010315 CVE-2019-1010317 CVE-2019-1010319 CVE-2020-35738 Debian Bug : 915564 915565 932060 932061 927903 978548 Multiple vulnerabilites in wavpack were found, like OOB read (which could potentially lead to a DOS attack), unexpected control flow, crashes, integer overflow, and segfaults. For Debian 9 stretch, these problems have been fixed in version 5.0.0-2+deb9u3. We recommend that you upgrade your wavpack packages. For the detailed security status of wavpack please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wavpack Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmABaXsACgkQgj6WdgbD S5aJrg/+IN3Qo681oqQ8UhGMoY7sORVnwsIrTFj9PkMPsOPCQY5FOPHPPGDYJAvT k9YkskGwtwnTn1wjnSrzpFEh74rOaWmEvdLoy7U4Cyqgqip0MeBw0PfTUAtytLis JIbcUhHvLHZwTQYG8BLwFuud9IjaX2a5xeVc+O5dGn5mOI4XOc9IO4h5uGOrkfod 2X5rhH5ft+D5kMNcJaboxvnNe+lAEi/ea779uXuB6va1UEmEtQUbi8LuaIopCt9c Mte4/nLPVxCL9fwsdoaP6Le1BDois6AL1JzAdw8/btJibJUmQ6Ji1z6z6x47afNX mudxqCPs7F911EPGB9XFVMry30OqucghxJzqIO3MUiTnnPI8NUXBbUJcW98L+AKi 4OVaC2BoZKpAEOSaOJeLLBBkz0fU0yJfeE4vP51Kad4JdIG5+8K4xvsm++Yf+Kdo aSgYLeAwaPBCs2SOOwzWM5RI0BNwf0STmYJw14UJq76eBZYgdQw0CuUnq9dU21xm 3uesY3RiUnbOhb8z18EdDzMGZjgM7rIdROwWPbvD1UvAefbViCLEzVPvVBGtbKsU /9cA7IyTOjaXywxvJW59ONCah1IodaEGtqEonA5yjbe/z4vtihSRjJLd71LWilYN 2V1NH7ow/Z4NJdra/9xIqj9+BgdmD00pGqN3WL5OPTHcwnBiOeY= =7FNQ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATT8ONLKJtyKPYoAQgUOA/8DEj+61aMllkYawhHg8izYqZtRMASd9nZ TwQYdNzVPdoTfqZ2xq07Bgwem8de6a5+Ji1GETrF00WA5f8eOyG6mbQgPduKwD5i UTcHsA9h+aaRglII3W7bT1YtOVatRMPUUQXFP40RNC2HyiMSMaO4HyeIUaqTuBAk sQvc9BQloghaCm57RCd2etdiGEtKhzrlxjfbUFqgeXt2sLSlk6B3Namrtf9yLTzT uaRST1ASyeUJwKhMR14WscsRE91y1bqxGm5YJFb5YpinLqQUVjfbqgui79mFFBK8 mGzPpfik5/2452QtK/Bj2y1S8Fv2rJ7M1nha+Eo6TBzpMkWHhsMh0+i7ucHNAMQ/ cXY+w3td4uXd5YvoT4tzbRtpitRyt20m2Mbt6zlyHwkx4pqWewG2B7+yakvj8rtH ElpwQFb+ROlJ5CKCsuQ9WoooW+d+biJVRXY3AvuZG/endpbzKypjj9TT4ps3uyiq XhIRX3dg5nR6Jrb3bKnYS5TdFI1Q7DZrBJHKJcud7FJE9geArlVOjZ8ag6YOEhAV xUdJPENcP2KQyPIXxXfXSUNiydF2YsXtULHcCwwX38CQPCIU2hwZYAMUBXPEwc/i tptkS9nU2ZpPAudr847jBbhXX9g3yA9ieOg4aTj6JuA9Nobo50QmVwKhGee1JOoe e9j1G/BZj+Q= =lbrY -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0194 - [Debian] snapd: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0194 snapd security update 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: snapd Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-11840 Reference: ESB-2019.2367 Original Bulletin: https://lists.debian.org/debian-lts-announce/2021/01/msg00015.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2527-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Brian May January 18, 2021 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : snapd Version : 2.21-2+deb9u1 CVE ID : CVE-2019-11840 golang-go.crypto was recently updated with a fix for CVE-2019-11840. This in turn requires all packages that use the affected code to be recompiled in order to pick up the security fix. CVE-2019-11840 An issue was discovered in supplementary Go cryptography libraries, aka golang-googlecode-go-crypto. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications. For Debian 9 stretch, this problem has been fixed in version 2.21-2+deb9u1. We recommend that you upgrade your snapd packages. For the detailed security status of snapd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/snapd Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEKpwfR8DOwu5vyB4TKpJZkldkSvoFAmAEqecACgkQKpJZkldk SvoQLg//c/lgWl8t2By4anfuAS3NbIO0pHvEpvZ9bw1CuffMFUG+DAIdjUYR9LHT T/dfrZccoJh+CKo7dU/vCKJDZaBdIdDzX420oQQQ+4MxUEpkq1iFlyy3UblV4mL6 79wpQY6QCEr/ytycl82NJSXUNo38EBH97lf3W9XeBm4cPscYbBBjbIpXD6748jNo e80KHNrVhQEbEUjEWbekgEgwSWGBnjIoImBQaZWvT3xiR6HkuTAnoF7FS6LbGUqe /IQa4FlyLzXU6JSWDkKgzgXVTdfrlVwH3cdElqIK2Rv/IA0Lm9gokzFQ+AZ4j7VH TDX2Sn+q6ls8MTohDDxi+byTVwBP0P9SnKyRKxSkcf9n5SzUyt16AtJdGcwn+bj4 0l+2nRZOjqMzXPCPQTFSfrdRONXyACeDftnScv+a1eFknQKvurskkLfeoqFG8mvN pgDQ00RQrT9YzD0L00OKMpL7c02f/cAH+3kiIlhXqpGk8m9xusZeFE/et7zihOCp aO7sS+hrl6Sve9JVVLWwjlttNTFgyK3S7w7yf+AJ7lhAzRYKTsNyDojYk3Oafuve 2YM8+6PxFN7QUQh6nDTe5Yc59bjifPXOJs0X8xEyPIDJs6i7KtvnsH+et82vHP1e Bvg/7eEKavqLKjp7UxSKTW2Kl7EqnpYma4bmLu9fe4g8ZQoY3Rs= =Dw9o - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATT4eNLKJtyKPYoAQhovA//UEznCos4v7vl5Ccj2Q30gn013wYIgNq2 zdLmnNR6PXwfPbHCw/zndnlsE43+j8itVprdDetDEtEarYMb8hzTy9b8iXK9M2kt F7qF8aJ1erGU6fLa5Nuqv2yKV8hW6GjbfHxQhSkJWvflIVhe1RZbPFSYOEZ8t83M NUdta8AncKOH5sPZ3+0NhufWNso7mOsh1YUSXC5cknuBA9tfPevrpKmZWBdgZiSP aSqRwSIM70dKR0rYr7VtBBM1+savwUvc0sq4b9Aysx3mQLArcmtjmXS8prjvdWbW oyVw170fXJ5q/W2PkhLVPhmyPvypvJg/39QeNM4oFb63eQzCrF13eAQqDqgElvbG /ejFgDDM1dWqXyNccM/khESv3s1K8gkYkYMLuDFKzNp5diN8LbI162OWNIrPnVKa A9kSyVoqOPy8GKulQd2RIN/PUa8pmOoIRkj57ucO89QY3eE9K1nrnDsXLqQIJnan RNn65bw9egHJpJEh2JwPTf0gy6+4SN1s23WjFVliGm7R0sNhMvJ4ogeaGzu1DpiH 1nJQwbInh6hzVAJSfI9nQMY11J/pHaSzOkLCKNBmqCR+eYN4+L50/NuP+WSHutrX vHw7o75che2RhCP1OFmuKXIYiHo0sUI0GWA/ShypJgdaUDCV7EcmdrKAN7OxyKzM lcthSOipc/I= =OUJs -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0193 - [Debian] chromium: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0193 chromium security update 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: chromium Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-21116 CVE-2021-21115 CVE-2021-21114 CVE-2021-21113 CVE-2021-21112 CVE-2021-21111 CVE-2021-21110 CVE-2021-21109 CVE-2021-21108 CVE-2021-21107 CVE-2021-21106 CVE-2020-16043 CVE-2020-15995 Reference: ASB-2021.0002 ESB-2021.0074 Original Bulletin: https://www.debian.org/security/2021/dsa-4832 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4832-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 16, 2021 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : chromium CVE ID : CVE-2020-15995 CVE-2020-16043 CVE-2021-21106 CVE-2021-21107 CVE-2021-21108 CVE-2021-21109 CVE-2021-21110 CVE-2021-21111 CVE-2021-21112 CVE-2021-21113 CVE-2021-21114 CVE-2021-21115 CVE-2021-21116 Debian Bug : 979533 Multiple security issues were discovered in the Chromium web browser, which could result in the execution of arbitrary code, denial of service or information disclosure. For the stable distribution (buster), these problems have been fixed in version 87.0.4280.141-0.1~deb10u1. We recommend that you upgrade your chromium packages. For the detailed security status of chromium please refer to its security tracker page at: https://security-tracker.debian.org/tracker/chromium Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAC8mNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0T2SQ//VcNAklJGO2KF1dGhC1DI4N+CEL30/Tr2ebKBUmiviiI+jyvwWpdqhKH6 +SG+gGNdTU5YkNL4++bWfaqaPhras8f0rvyFQX788z4/c+ek6tfRmLyeQY0BiHiH X+qYNUkWWYSkJznTTRpTGCeX+VxJjZPj268bY3aV8KugpmnxJ5ilTZ4WSR6s0YQP XjD876xj1OS4Z6Cw7jLwwJxIc4IOBsNqHJUmfawVLUbWHtsHxljxyFMH9EvC4oGs uDnCvqcSCxLNuXaHQVpjhgdHXH1zY/rM8TtwPWC4vR6FjXe+f5cpglvCd2xCjoQl rybm0WyFiUGVfTqqjOuE/kbtjcdiCcTzq8aREcgjasNCQo1DO90EtgbRKvBao4uU So0GhbPxI5D6a4pz+ExhNKPN5zLewvY+2rBMCbsi5emPqwk53EOCE6aVb41FsL/V FRdV9hNql9TXsv0PDuBQ86Ozt5/Yf2+gU+BcHc9ng/vq5fz7PQ/Jp6LL1qHH3tlm 7jcjJO58YRP6cgxGcf4om7WU+yJP2TOP3VP1h9HBlC4RjgLoD+c/YfCr2JMiOikX lSmUb1MWNN5w85Cyz4NUv2rRwKZUZeSaMW4WrCc0ZNOA6AemLqfZTTQmdm4/H7+M 7g/Kzl3I1mudmycNU95irf3cgvOeO6rct+hu8jvhRUSr6PN2YzM= =wU5Y - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATTz+NLKJtyKPYoAQhZPQ/9FAOHvxJvmXZ8jKNoW/Kek1rdPxxQYcgd bniagSrin9Z7HlkNk9E8XTBaiej8xUQKgIV+QH7EPau8/tA0JMSmqYfQnpcj1YrY +Fz0HDMMoTF6xW+aEuXBkRs4L/gC1j/Vtm+iZ9AHOFTec8zs45IyhBVSQOjvh5uY E7DZckliWerUaIsj62yRxUlCqzkzQ9tjjpey4ioYeIzLoSlvggxUrsWjUfCujXPR 08Sxmg7GivqxTXVPHfb2JCaU8YGa99NbV08Quv9m1l3fZFkxGfIeSzzq6pMYGbOC AlzqQjctABw7Y8REF2aRUfj8tyNOEtsW8jEoFEcqh7IVYgOxik1ilEf6Jg2Up4IN augbDDP5Z4NU1P7wTBQ8tyK+535BX0h3o3krrUEpML5FmToEcfnkMW3wy1a83gaY oulKkK4smt9lBfBPqA0SOwytYsADpOWTJzxM3mMaUTycBBh3mZP8CXQHn7hchtae kOjoscq5oTTyHPy6641897dOJr+lzA3ARz/VZ/MOj9yHE1fTheeDclJ6waPDrSCD DshbSjG9Q9FaeH3EEMg8SIJ5VO9/wroFLJ9lOYVHP0H3/fvu2cJQZTuBwN6aSGgM qk0YtHm7uy8OpKK4zgqejHlz0ZTYUiV3prcrmc6NuOHTAFHYubwZ0T9Q6X74ps+6 GS3JUUtFy7A= =zZNd -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0192 - [UNIX/Linux][Debian] ruby-redcarpet: Cross-site scripting - Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0192 ruby-redcarpet security update 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ruby-redcarpet Publisher: Debian Operating System: Debian GNU/Linux UNIX variants (UNIX, Linux, OSX) Impact/Access: Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-26298 Original Bulletin: https://lists.debian.org/debian-lts-announce/2021/01/msg00014.html https://www.debian.org/security/2021/dsa-4831 Comment: This bulletin contains two (2) Debian security advisories. This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running ruby-redcarpet check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2526-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Utkarsh Gupta January 15, 2021 https://wiki.debian.org/LTS - - ----------------------------------------------------------------------- Package : ruby-redcarpet Version : 3.3.4-2+deb9u1 CVE ID : CVE-2020-26298 Debian Bug : 980057 In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions, no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. For Debian 9 stretch, this problem has been fixed in version 3.3.4-2+deb9u1. We recommend that you upgrade your ruby-redcarpet packages. For the detailed security status of ruby-redcarpet please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-redcarpet Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmABbVYACgkQgj6WdgbD S5adqQ/9FwfgKSUYAacbG+/SXWa0Nlrx+IDl8zo1eTZ3gtLWzJvGBJwlufCvZfN6 htRhWWVLLxpsgC012GEDOvWSsvmFBZ7/JEZ9M6cNftYJFfYEwrnDiDc+G+tZxrV5 pIzfyfWXoYd+uZ4NqtLbcEoVHZJTO7kGS4NkkXNQheXpnQ+OKzMWJjfONxsM7IBN q7n7wLOKgmX7OksK2PNAlo8EBg3soso45kUJqv3Nr60Eq6ulj+mWSoC7Zo3vneUM R4GCXV6XGX1nVH8VIHYSPKQ1lobXGPzmp6bzIMis8zf/AePHjBFlcfVYRl8k8NOn ucYjoeYpQ/561Sm+DAI3WE8R3hyOeqsWR2ehN0ln4gkhyN9ddJP6GYcsU2oJ+HMG 1nIW194QWUyVwFI2I9mmFpUal35vFHnJND7BMEHoneWfyklHsoXOfDaQz8AajDS2 sEQwAM3I27yfvtPpV/HkD3ZtILbyP1rzN/zBPs0HJyH83o1mnvZEE+gz5/7HUguI ZEm+SBgCOCNjNKykZ/RCXWkVCNc3ot4R0hFDgPlxKLGx+3LintZkTeP3xxfyjoVi yo2lRHdEK1G0kUOVm1pq3nKY7eD394yTIxMb3qiUNdNbe+tJwY7+8QtqtO1qbhke 4I5fK40rzBLvzOQGrADx7ZXrtS4fqUkGBiZPsrCQmS4DcSEFn70= =y3i8 - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4831-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond January 15, 2021 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : ruby-redcarpet CVE ID : CVE-2020-26298 Debian Bug : 980057 Johan Smits discovered that ruby-redcarpet, a markdown parser, did not properly validate its input. This would allow an attacker to mount a cross-site scripting attack. For the stable distribution (buster), this problem has been fixed in version 3.4.0-4+deb10u1. We recommend that you upgrade your ruby-redcarpet packages. For the detailed security status of ruby-redcarpet please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-redcarpet Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmABkzwACgkQEL6Jg/PV nWSUJAf/S5a13rCfo6KGpWr3h1YAyuUlH8pFdM3zytlvX7tLDZMIQon1OL0fKecP lPDVE90EJoLBUUxdF1rSYWSQDS4fbCvSVuzcUqGrwgWvmEjL3rUTqaK189KB32sE 1wmGfqz0MS0ZBSAkPWLqkuMgRhP4SL2H78W9nssdLlC/eZ9G0kM1gTVOzQlrRVrc BNKX73zMfwP2LREWXpjMCpu6IxfNHaIWQHjWbDwWb92qbz0LAnujExo0PoKWGsvR 5DSYS+rasHfUr8VWGopKMZQp4AfFBKH+oAG2qpPpwGwRda9bI88yfT6hXtctpfDz kn5ERoIrC6OgXOEO9LnbLAUsEtCSSg== =D3qU - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATTvONLKJtyKPYoAQjdWxAAnP7Q79/5fSNdCPuGZhq82MKuQXww3dio Sy/8Ns/MV/CBMRpEAiO7/wHbrg3A12qoiuI2mLwSp/V7frqzpThJG+9djB/0vtOz Z0Vm4jmyb4HXdA1yWHyPldAKDavi/HAlBtt1xFP1QYwwrCWfk2whABuLbkyJI5Kp VMfBrG+80z2YmY030c6+m8bV8YbHMSBwgfdrJJ00kD8s/gRY5A2WkbcIS5U9TOkQ QTEkazWYKTx6p1tj9U3n3UbJVSuOXMMdVBMjHs57WEZhyV0RsWJRg3v6MzmVk54I n/iG4y8o9V3oXV6h0AgU9huqkQU4CsZ9g/ozLUPS1yQ8FPp8DZBe8O1RGVNVCBiz RTHxe9Cn2a0glwrCteCCfU1Lb90QqTdT+ff3tTQtkUFDV8hlu2+qC5P7lSENCw1P Y8H+W4AlVxUaG85hPXW4IQSrwzvtRitCbo6e7uraCivTu1N/u+OQ04TRByGhfEy2 JpMywnWLwhUH3XzhNBbipg9MINq2Rs12yUt5eoOtg9c5wHxAhQVGFgNwrYdZBbvE kzUb3kC7TkvNSfw2p9Jt27ZhdZiJe1FrxGJ/MBqmSTlYvjSZ77Vecu+20OOU7iM9 phVfqQPo8VeHuZi4mmdoWeWz1otKe8AMmppIyEHHWo5lGZWrEaiGAaqeSu1a3ekz mCvLyRLVwEs= =Fed+ -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2021.0189.2 - UPDATE [SUSE] linux kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0189.2 Security update for the Linux Kernel 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: linux kernel Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Root Compromise -- Existing Account Access Privileged Data -- Existing Account Modify Arbitrary Files -- Existing Account Denial of Service -- Existing Account Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-36158 CVE-2020-29661 CVE-2020-29660 CVE-2020-29373 CVE-2020-29370 CVE-2020-28374 CVE-2020-27830 CVE-2020-27825 CVE-2020-27786 CVE-2020-27777 CVE-2020-27068 CVE-2020-11668 CVE-2020-4788 CVE-2020-0466 CVE-2020-0465 CVE-2020-0444 CVE-2019-20934 CVE-2018-20669 Reference: ESB-2021.0166 ESB-2020.4410 ESB-2020.4275.2 ESB-2020.3888 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210117-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210118-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210133-1 Comment: This bulletin contains three (3) SUSE security advisories. Revision History: January 18 2021: Vendor released associated suse-su-20210133-1 January 15 2021: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0117-1 Rating: moderate References: #1040855 #1044120 #1044767 #1055117 #1065729 #1094840 #1109695 #1115431 #1138374 #1139944 #1149032 #1152457 #1152472 #1152489 #1155518 #1156315 #1156395 #1158775 #1161099 #1163727 #1165933 #1167657 #1168952 #1171000 #1171078 #1171688 #1172145 #1172733 #1174486 #1175079 #1175480 #1175995 #1176396 #1176942 #1176956 #1177326 #1177500 #1177666 #1177679 #1177733 #1178049 #1178203 #1178270 #1178372 #1178590 #1178612 #1178634 #1178660 #1178756 #1178780 #1179107 #1179204 #1179419 #1179434 #1179435 #1179519 #1179575 #1179578 #1179601 #1179604 #1179639 #1179652 #1179656 #1179670 #1179671 #1179672 #1179673 #1179675 #1179676 #1179677 #1179678 #1179679 #1179680 #1179681 #1179682 #1179683 #1179684 #1179685 #1179687 #1179688 #1179689 #1179690 #1179703 #1179704 #1179707 #1179709 #1179710 #1179711 #1179712 #1179713 #1179714 #1179715 #1179716 #1179745 #1179763 #1179888 #1179892 #1179896 #1179960 #1179963 #1180027 #1180029 #1180031 #1180052 #1180056 #1180086 #1180117 #1180258 #1180261 #1180506 #1180541 #1180559 #1180566 Cross-References: CVE-2020-0444 CVE-2020-0465 CVE-2020-0466 CVE-2020-11668 CVE-2020-27068 CVE-2020-27777 CVE-2020-27786 CVE-2020-27825 CVE-2020-27830 CVE-2020-28374 CVE-2020-29370 CVE-2020-29373 CVE-2020-29660 CVE-2020-29661 CVE-2020-36158 Affected Products: SUSE Linux Enterprise Workstation Extension 15-SP2 SUSE Linux Enterprise Module for Live Patching 15-SP2 SUSE Linux Enterprise Module for Legacy Software 15-SP2 SUSE Linux Enterprise Module for Development Tools 15-SP2 SUSE Linux Enterprise Module for Basesystem 15-SP2 SUSE Linux Enterprise High Availability 15-SP2 ______________________________________________________________________________ An update that solves 15 vulnerabilities and has 98 fixes is now available. Description: The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372). o CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559). o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc #1179960). o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031). o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086). o CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027). o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029). o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745). o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745). o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107). o CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434). o CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952). o CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656). o CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc# 1179435). o CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601). The following non-security bugs were fixed: o ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc# SLE-16610). o ACPI: PNP: compare the string length in the matching_id() (git-fixes). o ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes). o ALSA: core: memalloc: add page alignment for iram (git-fixes). o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes). o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes). o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes). o ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes). o ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes). o ALSA: hda/proc - print DP-MST connections (git-fixes). o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes). o ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes). o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes). o ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes). o ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes). o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes). o ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes). o ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes). o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes). o ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes). o ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes). o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes). o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes). o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes). o ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes). o ALSA: seq: remove useless function (git-fixes). o ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203). o ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203). o ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes). o ALSA: usb-audio: Add implicit_fb module option (bsc#1178203). o ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes). o ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203). o ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203). o ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes). o ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes). o ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203). o ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203). o ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc# 1178203). o ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc# 1178203). o ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203). o ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203). o ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc# 1178203). o ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203). o ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes). o ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc# 1178203). o ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc #1178203). o ALSA: usb-audio: Drop debug.h (bsc#1178203). o ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203). o ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203). o ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203). o ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes). o ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203). o ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203). o ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc# 1178203). o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes). o ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203). o ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc# 1178203). o ALSA: usb-audio: Improve some debug prints (bsc#1178203). o ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203). o ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc #1178203). o ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc# 1178203). o ALSA: usb-audio: Properly match with audio interface class (bsc#1178203). o ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203). o ALSA: usb-audio: Refactor endpoint management (bsc#1178203). o ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203). o ALSA: usb-audio: Replace slave/master terms (bsc#1178203). o ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203). o ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc# 1178203). o ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc# 1178203). o ALSA: usb-audio: Simplify hw_params rules (bsc#1178203). o ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203). o ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203). o ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203). o ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc# 1178203). o ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203). o ALSA: usb-audio: Support PCM sync_stop (bsc#1178203). o ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc# 1178203). o ALSA: usb-audio: Unify the code for the next packet size calculation (bsc# 1178203). o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes). o ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203). o ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203). o ALSA: usb-audio: Use managed buffer allocation (bsc#1178203). o ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc# 1178203). o ALSA: usb-audio: workaround for iface reset issue (bsc#1178203). o arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc# SLE-16610). o ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes). o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes). o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes). o ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes). o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes). o ASoC: meson: fix COMPILE_TEST error (git-fixes). o ASoC: pcm: DRAIN support reactivation (git-fixes). o ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes). o ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes). o ASoC: tegra20-spdif: remove "default m" (git-fixes). o ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes). o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes). o ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes). o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control() (git-fixes). o ath10k: Fix an error handling path (git-fixes). o ath10k: Release some resources in an error handling path (git-fixes). o ath6kl: fix enum-conversion warning (git-fixes). o batman-adv: Consider fragmentation for needed_headroom (git-fixes). o batman-adv: Do not always reallocate the fragmentation skb head (git-fixes). o batman-adv: Reserve needed_*room for fragments (git-fixes). o blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486). o block: return status code in blk_mq_end_request() (bsc#1171000, bsc# 1165933). o Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes). o Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes). o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes). o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes). o Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes). o bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes). o btrfs: add missing check for nocow and compression inode flags (bsc# 1178780). o btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099). o btrfs: delete duplicated words + other fixes in comments (bsc#1180566). o btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566). o btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc #1180566). o btrfs: fix readahead hang and use-after-free after removing a device (bsc# 1179963). o btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963). o btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634). o btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575). o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes). o can: c_can: c_can_power_up(): fix error handling (git-fixes). o can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes). o can: softing: softing_netdev_open(): fix error handling (git-fixes). o can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes). o cfg80211: initialize rekey_data (git-fixes). o cifs: add NULL check for ses->tcon_ipc (bsc#1178270). o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956). o cifs: do not share tcons with DFS (bsc#1178270). o cifs: document and cleanup dfs mount (bsc#1178270). o cifs: ensure correct super block for DFS reconnect (bsc#1178270). o cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270). o cifs: fix check of tcon dfs in smb1 (bsc#1178270). o cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270). o cifs: fix double free error on share and prefix (bsc#1178270). o cifs: fix leaked reference on requeued write (bsc#1178270). o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944). o cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270). o cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc# 1178270). o cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270). o cifs: handle hostnames that resolve to same ip in failover (bsc#1178270). o cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270). o cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc# 1178270). o cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc# 1178270). o cifs: reduce number of referral requests in DFS link lookups (bsc#1178270). o cifs: rename reconn_inval_dfs_target() (bsc#1178270). o cifs: set up next DFS target before generic_ip_connect() (bsc#1178270). o clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes). o clk: ingenic: Fix divider calculation with div tables (git-fixes). o clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes). o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes). o clk: renesas: r9a06g032: Drop __packed for portability (git-fixes). o clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes). o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes). o clk: tegra: Do not return 0 on failure (git-fixes). o clk: tegra: Fix duplicated SE clock entry (git-fixes). o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes). o clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes). o clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes). o clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes). o clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes). o compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203). o coredump: fix core_pattern parse error (git-fixes). o cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes). o cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes). o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes). o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes). o crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes). o crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes). o crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes). o crypto: inside-secure - Fix sizeof() mismatch (git-fixes). o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes). o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes). o crypto: sun4i-ss - add the A33 variant of SS (git-fixes). o crypto: talitos - Endianess in current_desc_hdr() (git-fixes). o crypto: talitos - Fix return type of current_desc_hdr() (git-fixes). o cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes). o dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes). o drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes). o drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc# 1152489) o drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: * context fixes o drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472) o drm/gma500: fix error check (bsc#1152472) Backporting changes: * context fixes o drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: * context fixes o drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: * context fixes * adapted I/O functions to old driver o drm/imx: tve remove extraneous type qualifier (bsc#1152489) o drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc# 1152472) o drm/mediatek: Add missing put_device() call in (bsc#1152472) o drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc# 1152472) Backporting changes: * context fixes * adapted to function layout o drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489) o drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: * context fixes o drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489) o drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: * context fixes o drm/radeon: Prefer lower feedback dividers (bsc#1152489) o drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489) o drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489) o drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: * context fixes o drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: * context fixes o drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: * changed filename from vkms_composer.c to vkms_crc.c * context fixes o drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: * context fixes o drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: * context fixes o drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489) o drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: * context fixes o drm: rcar-du: Put reference to VSP device (bsc#1152489) o EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763). o EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489). o EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc# 1152489). o epoll: Keep a reference on files added to the check list (bsc#1180031). o ethtool: fix error handling in ethtool_phys_id (git-fixes). o ext4: correctly report "not supported" for {usr,grp}jquota when ! CONFIG_QUOTA (bsc#1179672). o ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716). o ext4: fix leaking sysfs kobject after failed mount (bsc#1179670). o ext4: limit entries returned when counting fsmap records (bsc#1179671). o ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc# 1179673). o extcon: max77693: Fix modalias string (git-fixes). o fail_function: Remove a redundant mutex unlock (bsc#1149032). o fbcon: Remove the superfluous break (bsc#1152472) o firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610). o fix regression in "epoll: Keep a reference on files added to the check list" (bsc#1180031, git-fixes). o fs/minix: check return value of sb_getblk() (bsc#1179676). o fs/minix: do not allow getting deleted inodes (bsc#1179677). o fs/minix: fix block limit check for V1 filesystems (bsc#1179680). o fs/minix: reject too-large maximum file size (bsc#1179678). o fs/minix: remove expected error message in block_to_path() (bsc#1179681). o fs/minix: set s_maxbytes correctly (bsc#1179679). o fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682). o fs: Do not invalidate page buffers in block_write_full_page() (bsc# 1179711). o ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes). o geneve: pull IP header before ECN decapsulation (git-fixes). o genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc# 1065729). o genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc# 1156315). o gpio: mvebu: fix potential user-after-free on probe (git-fixes). o gpio: mvebu: update Armada XP per-CPU comment (git-fixes). o HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes). o HID: Add Logitech Dinovo Edge battery quirk (git-fixes). o HID: add support for Sega Saturn (git-fixes). o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes). o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes). o HID: i2c-hid: add Vero K147 to descriptor override (git-fixes). o HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes). o HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes). o HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes). o HMAT: Register memory-side cache after parsing (bsc#1178660). o HMAT: Skip publishing target info for nodes with no online memory (bsc# 1178660). o HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes). o i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes). o IB/isert: Fix unaligned immediate-data handling (bsc#1152489) o IB/mlx4: Add and improve logging (bsc#1152489) o IB/mlx4: Add support for MRA (bsc#1152489) o IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489) o IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489) o IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489) o IB/rdmavt: Fix sizeof mismatch (bsc#1152489) o IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489) o IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489) o ibmvnic: add some debugs (bsc#1179896 ltc#190255). o ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes). o ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc# 184239 git-fixes). o ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes). o ibmvnic: enhance resetting status check during module exit (bsc#1065729). o ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes). o ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes). o ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes). o ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc# 155423 git-fixes). o ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes). o iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes). o iio: buffer: Fix demux update (git-fixes). o iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes). o iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes). o iio:imu:bmi160: Fix too large a buffer (git-fixes). o iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes). o iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes). o iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes). o iio:pressure:mpl3115: Force alignment of buffer (git-fixes). o inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes). o Input: ads7846 - fix integer overflow on Rt calculation (git-fixes). o Input: ads7846 - fix race that causes missing releases (git-fixes). o Input: ads7846 - fix unaligned access on 7845 (git-fixes). o Input: cm109 - do not stomp on control URB (git-fixes). o Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes). o Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes). o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes). o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes). o Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes). o Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes). o Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes). o Input: omap4-keypad - fix runtime PM error handling (git-fixes). o Input: xpad - support Ardwiino Controllers (git-fixes). o iomap: Clear page error before beginning a write (bsc#1179683). o iomap: Mark read blocks uptodate in write_begin (bsc#1179684). o iomap: Set all uptodate bits for an Uptodate page (bsc#1179685). o iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652). o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes). o iwlwifi: mvm: hook up missing RX handlers (git-fixes). o iwlwifi: pcie: add one missing entry for AX210 (git-fixes). o iwlwifi: pcie: limit memory read spin time (git-fixes). o jbd2: fix up sparse warnings in checkpoint code (bsc#1179707). o kABI workaround for HD-audio generic parser (git-fixes). o kABI workaround for USB audio driver (bsc#1178203). o kABI: genirq: add back irq_create_mapping (bsc#1065729). o kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc #1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc# 1156395). o lan743x: fix for potential NULL pointer dereference with bare card (git-fixes). o libfs: fix error cast of negative value in simple_attr_write() (bsc# 1179709). o locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc# 1149032). o mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes). o mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes). o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc# 1163727). o md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727). o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727). o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727). o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727). o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727). o md/cluster: block reshape with remote resync job (bsc#1163727). o md/cluster: fix deadlock when node is doing resync job (bsc#1163727). o media: gspca: Fix memory leak in probe (git-fixes). o media: imx214: Fix stop streaming (git-fixes). o media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes). o media: ipu3-cio2: Remove traces of returned buffers (git-fixes). o media: ipu3-cio2: Return actual subdev format (git-fixes). o media: ipu3-cio2: Serialise access to pad format (git-fixes). o media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes). o media: max2175: fix max2175_set_csm_mode() error code (git-fixes). o media: msi2500: assign SPI bus number dynamically (git-fixes). o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm () (git-fixes). o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm () (git-fixes). o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes). o media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes). o media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes). o media: solo6x10: fix missing snd_card_free in error handling case (git-fixes). o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes). o media: tm6000: Fix sizeof() mismatches (git-fixes). o media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc# 1180117). o memstick: fix a double-free bug in memstick_check (git-fixes). o memstick: r592: Fix error return in r592_probe() (git-fixes). o mfd: rt5033: Fix errorneous defines (git-fixes). o mm,memory_failure: always pin the page in madvise_inject_error (bsc# 1180258). o mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710). o mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610). o mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679). o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204). o mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056). o mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes). o mmc: pxamci: Fix error return code in pxamci_probe (git-fixes). o mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes). o mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes). o mtd: rawnand: meson: Fix a resource leak in init (git-fixes). o mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes). o mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes). o mtd: spinand: Fix OOB read (git-fixes). o mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes). o net/x25: prevent a couple of overflows (bsc#1178590). o net: sctp: Rename fallthrough label to unhandled (bsc#1178203). o nfc: s3fwrn5: Release the nfc firmware (git-fixes). o nvme-fabrics: allow to queue requests for live queues (git-fixes). o nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc# 1179519). o nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326). o nvme-fc: cancel async events before freeing event struct (git-fixes). o nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc# 1177326). o nvme-fc: fix error loop in create_hw_io_queues (git-fixes). o nvme-fc: fix io timeout to abort I/O (bsc#1177326). o nvme-fc: remove err_work work item (bsc#1177326). o nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326). o nvme-fc: shorten reconnect delay if possible for FC (git-fixes). o nvme-fc: track error_recovery while connecting (bsc#1177326). o nvme-fc: wait for queues to freeze before calling (git-fixes). o nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes). o nvme-multipath: fix deadlock due to head->lock (git-fixes). o nvme-pci: properly print controller address (git-fixes). o nvme-rdma: avoid race between time out and tear down (bsc#1179519). o nvme-rdma: avoid repeated request completion (bsc#1179519). o nvme-rdma: cancel async events before freeing event struct (git-fixes). o nvme-rdma: fix controller reset hang during traffic (bsc#1179519). o nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc# 1179519). o nvme-rdma: fix timeout handler (bsc#1179519). o nvme-rdma: handle unexpected nvme completion data length (bsc#1178612). o nvme-rdma: serialize controller teardown sequences (bsc#1179519). o nvme-tcp: avoid race between time out and tear down (bsc#1179519). o nvme-tcp: avoid repeated request completion (bsc#1179519). o nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519). o nvme-tcp: break from io_work loop if recv failed (bsc#1179519). o nvme-tcp: cancel async events before freeing event struct (git-fixes). o nvme-tcp: do not poll a non-live queue (bsc#1179519). o nvme-tcp: fix controller reset hang during traffic (bsc#1179519). o nvme-tcp: fix possible crash in recv error flow (bsc#1179519). o nvme-tcp: fix possible leakage during error flow (git-fixes). o nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc# 1179519). o nvme-tcp: fix timeout handler (bsc#1179519). o nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519). o nvme-tcp: leverage request plugging (bsc#1179519). o nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519). o nvme-tcp: optimize network stack with setting msg flags (bsc#1179519). o nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes). o nvme-tcp: serialize controller teardown sequences (bsc#1179519). o nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc# 1179519). o nvme-tcp: try to send request in queue_rq context (bsc#1179519). o nvme-tcp: use bh_lock in data_ready (bsc#1179519). o nvme: do not protect ns mutation with ns->head->lock (git-fixes). o nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519). o nvme: introduce nvme_sync_io_queues (bsc#1179519). o nvme: Revert: Fix controller creation races with teardown (git-fixes). o nvmet-fc: fix missing check for no hostport struct (bsc#1176942). o nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892). o ocfs2: fix unbalanced locking (bsc#1180506). o orinoco: Move context allocation after processing the skb (git-fixes). o PCI: brcmstb: Initialize "tmp" before use (git-fixes). o PCI: Fix overflow in command-line resource alignment requests (git-fixes). o PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes). o PCI: iproc: Fix out-of-bound array accesses (git-fixes). o pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes). o pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes). o pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes). o pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes). o pinctrl: merrifield: Set default bias in case no particular value given (git-fixes). o platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes). o platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes). o platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes). o platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes). o platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes). o platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes). o platform/x86: mlx-platform: remove an unused variable (git-fixes). o platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes). o platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes). o platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes). o platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes). o platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes). o power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes). o power: supply: bq24190_charger: fix reference leak (git-fixes). o powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc #1065729). o powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes). o powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc# 1179888 ltc#190253). o powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes). o powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395). o powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395). o powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc# 189002). o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc# 184630). o powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc# 1179578 ltc#189313). o powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes). o powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729). o powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes). o powerpc/xmon: Change printk() to pr_cont() (bsc#1065729). o powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395). o powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc# 1065729). o pwm: lp3943: Dynamically allocate PWM chip base (git-fixes). o pwm: zx: Add missing cleanup in error path (git-fixes). o qede: Notify qedr when mtu has changed (bsc#1152489) o qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes). o quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714). o RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc# 1152489) o RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489) o RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489) o RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc# 1152489) o RDMA/core: Fix reported speed and width (bsc#1152489) o RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc# 1152489) o RDMA/core: Free DIM memory in error unwind (bsc#1152489) o RDMA/core: Stop DIM before destroying CQ (bsc#1152489) o RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489) o RDMA/counter: Only bind user QPs in auto mode (bsc#1152489) o RDMA/hns: Add check for the validity of sl configuration (bsc#1152489) o RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489) o RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489) o RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489) o RDMA/hns: Set the unsupported wr opcode (bsc#1152489) o RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489) o RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489) o RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489) o RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489) o RDMA/qedr: Endianness warnings cleanup (bsc#1152489) o RDMA/qedr: Fix doorbell setting (bsc#1152489) o RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489) o RDMA/qedr: Fix iWARP active mtu display (bsc#1152489) o RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489) o RDMA/qedr: Fix qp structure memory leak (bsc#1152489) o RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489) o RDMA/qedr: Fix use of uninitialized field (bsc#1152489) o RDMA/qedr: SRQ's bug fixes (bsc#1152489) o RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489) o RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489) o RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489) o RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc# 1152489) o RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489) o RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489) o RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489) o RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489) o RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489) o RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489) o RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489) o RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489) o RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489) o Re-import the upstream uvcvideo fix; one more fix will be added later (bsc# 1180117) o regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes). o regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes). o regulator: mcp16502: add linear_min_sel (git-fixes). o reiserfs: Fix oops during mount (bsc#1179715). o reiserfs: Initialize inode keys properly (bsc#1179713). o remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes). o remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes). o remoteproc: qcom: fix reference leak in adsp_start (git-fixes). o rsi: fix error return code in rsi_reset_card() (git-fixes). o rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes). o rtc: hym8563: enable wakeup when applicable (git-fixes). o rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes). o s390/cpuinfo: show processor physical address (git-fixes). o s390/pci: fix CPU address in MSI for directed IRQ (git-fixes). o s390/qeth: delay draining the TX buffers (git-fixes). o s390/qeth: fix af_iucv notification race (git-fixes). o s390/qeth: fix tear down of async TX buffers (git-fixes). o s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC# 190151). o s390: add 3f program exception handler (git-fixes). o samples/bpf: Remove unused test_ipip.sh (bsc#1155518). o samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518). o sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes) o sched/fair: Fix race between runtime distribution and (git-fixes) o sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes) o sched/fair: Refill bandwidth before scaling (git-fixes) o sched: correct SD_flags returned by tl->sd_flags() (git-fixes) o scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049). o scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc# 1171000). o scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079). o scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079). o scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079). o scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079). o scsi: fnic: Validate io_req before others (bsc#1175079). o scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix spelling mistake "Cant" -> "Can't" (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc# 1177500). o scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc #1176942 bsc#1177500). o scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Get device objects using sas_address & portID (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc #1177733). o scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc #1177733). o scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc #1177733). o scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc #1177733). o scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc# 1177733). o scsi: qla2xxx: Change post del message from debug level to log level (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733). o scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: storvsc: Fix error return in storvsc_probe() (git-fixes). o scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc# 1172733). o scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc# 1165933, bsc#1171000). o scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc #1165933). o selftest/bpf: Add missed ip6ip6 test back (bsc#1155518). o selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518). o selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518). o selftests/bpf: Print reason when a tester could not run a program (bsc# 1155518). o serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes). o serial_core: Check for port state when tty is in error state (git-fixes). o slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes). o soc/tegra: fuse: Fix index bug in get_process_id (git-fixes). o soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes). o soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes). o soc: mediatek: Check if power domains can be powered on at boot time (git-fixes). o soc: qcom: geni: More properly switch to DMA mode (git-fixes). o soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes). o soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes). o soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes). o soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes). o speakup: fix uninitialized flush_lock (git-fixes). o spi: atmel-quadspi: Disable clock in probe error path (git-fixes). o spi: atmel-quadspi: Fix AHB memory accesses (git-fixes). o spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes). o spi: davinci: Fix use-after-free on unbind (git-fixes). o spi: fix resource leak for drivers without .remove callback (git-fixes). o spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes). o spi: mt7621: Disable clock in probe error path (git-fixes). o spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes). o spi: mxs: fix reference leak in mxs_spi_probe (git-fixes). o spi: pic32: Do not leak DMA channels in probe error path (git-fixes). o spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes). o spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes). o spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes). o spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes). o spi: sprd: fix reference leak in sprd_spi_remove (git-fixes). o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes). o spi: stm32: fix reference leak in stm32_spi_resume (git-fixes). o spi: synquacer: Disable clock in probe error path (git-fixes). o spi: tegra114: fix reference leak in tegra spi ops (git-fixes). o spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes). o spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes). o staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes). o staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe () (git-fixes). o thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes). o tty: Fix ->pgrp locking in tiocspgrp() (git-fixes). o tty: Fix ->session locking (bsc#1179745). o ubifs: dent: Fix some potential memory leaks while iterating entries (bsc# 1179703). o ubifs: Do not parse authentication mount options in remount process (bsc# 1179688). o ubifs: Fix a memleak after dumping authentication mount options (bsc# 1179687). o ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc# 1179675). o ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704). o ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689). o ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc# 1179690). o udf: Fix memory leak when mounting (bsc#1179712). o usb/max3421: fix return error code in max3421_probe() (git-fixes). o usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes). o usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes). o usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes). o usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes). o usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes). o usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes). o usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes). o usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes). o usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes). o usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes). o usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes). o usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes). o usb: serial: ch341: add new Product ID for CH341A (git-fixes). o usb: serial: ch341: sort device-id entries (git-fixes). o usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes). o usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes). o usb: serial: keyspan_pda: fix stalled writes (git-fixes). o usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes). o usb: serial: keyspan_pda: fix write deadlock (git-fixes). o usb: serial: keyspan_pda: fix write unthrottling (git-fixes). o usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes). o usb: serial: kl5kusb105: fix memleak on open (git-fixes). o usb: serial: mos7720: fix parallel-port state restore (git-fixes). o usb: serial: option: add Fibocom NL668 variants (git-fixes). o usb: serial: option: add interface-number sanity check to flag handling (git-fixes). o usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes). o usb: serial: option: fix Quectel BG96 matching (git-fixes). o usb: UAS: introduce a quirk to set no_write_same (git-fixes). o usbnet: ipheth: fix connectivity with iOS 14 (git-fixes). o video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472) o video: fbdev: sis: fix null ptr dereference (bsc#1152472) o watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes). o watchdog: coh901327: add COMMON_CLK dependency (git-fixes). o watchdog: Fix potential dereferencing of null pointer (git-fixes). o watchdog: qcom: Avoid context switch in restart handler (git-fixes). o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes). o watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes). o watchdog: sprd: check busy bit before new loading rather than after that (git-fixes). o watchdog: sprd: remove watchdog disable from resume fail path (git-fixes). o wimax: fix duplicate initializer warning (git-fixes). o x86/apic/vector: Fix ordering in vector assignment (bsc#1156315). o x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489). o x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489). o x86/ima: use correct identifier for SetupMode variable (bsc#1152489). o x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489). o x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489). o x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489). o x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489). o x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc #1152489). o x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489). o x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc# 1152489). o x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489). o x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489). o x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc #1152489). o x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489). o x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489). o xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-WE-15-SP2-2021-117=1 o SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2021-117=1 o SUSE Linux Enterprise Module for Legacy Software 15-SP2: zypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2021-117=1 o SUSE Linux Enterprise Module for Development Tools 15-SP2: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-117=1 o SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-117=1 o SUSE Linux Enterprise High Availability 15-SP2: zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2021-117=1 Package List: o SUSE Linux Enterprise Workstation Extension 15-SP2 (x86_64): kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 kernel-default-extra-5.3.18-24.46.1 kernel-default-extra-debuginfo-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 kernel-default-livepatch-5.3.18-24.46.1 kernel-default-livepatch-devel-5.3.18-24.46.1 kernel-livepatch-5_3_18-24_46-default-1-5.3.1 kernel-livepatch-5_3_18-24_46-default-debuginfo-1-5.3.1 kernel-livepatch-SLE15-SP2_Update_9-debugsource-1-5.3.1 o SUSE Linux Enterprise Module for Legacy Software 15-SP2 (aarch64 ppc64le s390x x86_64): kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 reiserfs-kmp-default-5.3.18-24.46.1 reiserfs-kmp-default-debuginfo-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le s390x x86_64): kernel-obs-build-5.3.18-24.46.1 kernel-obs-build-debugsource-5.3.18-24.46.1 kernel-syms-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 x86_64): kernel-preempt-debuginfo-5.3.18-24.46.1 kernel-preempt-debugsource-5.3.18-24.46.1 kernel-preempt-devel-5.3.18-24.46.1 kernel-preempt-devel-debuginfo-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch): kernel-docs-5.3.18-24.46.1 kernel-source-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): kernel-default-5.3.18-24.46.1 kernel-default-base-5.3.18-24.46.1.9.19.1 kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 kernel-default-devel-5.3.18-24.46.1 kernel-default-devel-debuginfo-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 x86_64): kernel-preempt-5.3.18-24.46.1 kernel-preempt-debuginfo-5.3.18-24.46.1 kernel-preempt-debugsource-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch): kernel-devel-5.3.18-24.46.1 kernel-macros-5.3.18-24.46.1 o SUSE Linux Enterprise High Availability 15-SP2 (aarch64 ppc64le s390x x86_64): cluster-md-kmp-default-5.3.18-24.46.1 cluster-md-kmp-default-debuginfo-5.3.18-24.46.1 dlm-kmp-default-5.3.18-24.46.1 dlm-kmp-default-debuginfo-5.3.18-24.46.1 gfs2-kmp-default-5.3.18-24.46.1 gfs2-kmp-default-debuginfo-5.3.18-24.46.1 kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 ocfs2-kmp-default-5.3.18-24.46.1 ocfs2-kmp-default-debuginfo-5.3.18-24.46.1 References: o https://www.suse.com/security/cve/CVE-2020-0444.html o https://www.suse.com/security/cve/CVE-2020-0465.html o https://www.suse.com/security/cve/CVE-2020-0466.html o https://www.suse.com/security/cve/CVE-2020-11668.html o https://www.suse.com/security/cve/CVE-2020-27068.html o https://www.suse.com/security/cve/CVE-2020-27777.html o https://www.suse.com/security/cve/CVE-2020-27786.html o https://www.suse.com/security/cve/CVE-2020-27825.html o https://www.suse.com/security/cve/CVE-2020-27830.html o https://www.suse.com/security/cve/CVE-2020-28374.html o https://www.suse.com/security/cve/CVE-2020-29370.html o https://www.suse.com/security/cve/CVE-2020-29373.html o https://www.suse.com/security/cve/CVE-2020-29660.html o https://www.suse.com/security/cve/CVE-2020-29661.html o https://www.suse.com/security/cve/CVE-2020-36158.html o https://bugzilla.suse.com/1040855 o https://bugzilla.suse.com/1044120 o https://bugzilla.suse.com/1044767 o https://bugzilla.suse.com/1055117 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1094840 o https://bugzilla.suse.com/1109695 o https://bugzilla.suse.com/1115431 o https://bugzilla.suse.com/1138374 o https://bugzilla.suse.com/1139944 o https://bugzilla.suse.com/1149032 o https://bugzilla.suse.com/1152457 o https://bugzilla.suse.com/1152472 o https://bugzilla.suse.com/1152489 o https://bugzilla.suse.com/1155518 o https://bugzilla.suse.com/1156315 o https://bugzilla.suse.com/1156395 o https://bugzilla.suse.com/1158775 o https://bugzilla.suse.com/1161099 o https://bugzilla.suse.com/1163727 o https://bugzilla.suse.com/1165933 o https://bugzilla.suse.com/1167657 o https://bugzilla.suse.com/1168952 o https://bugzilla.suse.com/1171000 o https://bugzilla.suse.com/1171078 o https://bugzilla.suse.com/1171688 o https://bugzilla.suse.com/1172145 o https://bugzilla.suse.com/1172733 o https://bugzilla.suse.com/1174486 o https://bugzilla.suse.com/1175079 o https://bugzilla.suse.com/1175480 o https://bugzilla.suse.com/1175995 o https://bugzilla.suse.com/1176396 o https://bugzilla.suse.com/1176942 o https://bugzilla.suse.com/1176956 o https://bugzilla.suse.com/1177326 o https://bugzilla.suse.com/1177500 o https://bugzilla.suse.com/1177666 o https://bugzilla.suse.com/1177679 o https://bugzilla.suse.com/1177733 o https://bugzilla.suse.com/1178049 o https://bugzilla.suse.com/1178203 o https://bugzilla.suse.com/1178270 o https://bugzilla.suse.com/1178372 o https://bugzilla.suse.com/1178590 o https://bugzilla.suse.com/1178612 o https://bugzilla.suse.com/1178634 o https://bugzilla.suse.com/1178660 o https://bugzilla.suse.com/1178756 o https://bugzilla.suse.com/1178780 o https://bugzilla.suse.com/1179107 o https://bugzilla.suse.com/1179204 o https://bugzilla.suse.com/1179419 o https://bugzilla.suse.com/1179434 o https://bugzilla.suse.com/1179435 o https://bugzilla.suse.com/1179519 o https://bugzilla.suse.com/1179575 o https://bugzilla.suse.com/1179578 o https://bugzilla.suse.com/1179601 o https://bugzilla.suse.com/1179604 o https://bugzilla.suse.com/1179639 o https://bugzilla.suse.com/1179652 o https://bugzilla.suse.com/1179656 o https://bugzilla.suse.com/1179670 o https://bugzilla.suse.com/1179671 o https://bugzilla.suse.com/1179672 o https://bugzilla.suse.com/1179673 o https://bugzilla.suse.com/1179675 o https://bugzilla.suse.com/1179676 o https://bugzilla.suse.com/1179677 o https://bugzilla.suse.com/1179678 o https://bugzilla.suse.com/1179679 o https://bugzilla.suse.com/1179680 o https://bugzilla.suse.com/1179681 o https://bugzilla.suse.com/1179682 o https://bugzilla.suse.com/1179683 o https://bugzilla.suse.com/1179684 o https://bugzilla.suse.com/1179685 o https://bugzilla.suse.com/1179687 o https://bugzilla.suse.com/1179688 o https://bugzilla.suse.com/1179689 o https://bugzilla.suse.com/1179690 o https://bugzilla.suse.com/1179703 o https://bugzilla.suse.com/1179704 o https://bugzilla.suse.com/1179707 o https://bugzilla.suse.com/1179709 o https://bugzilla.suse.com/1179710 o https://bugzilla.suse.com/1179711 o https://bugzilla.suse.com/1179712 o https://bugzilla.suse.com/1179713 o https://bugzilla.suse.com/1179714 o https://bugzilla.suse.com/1179715 o https://bugzilla.suse.com/1179716 o https://bugzilla.suse.com/1179745 o https://bugzilla.suse.com/1179763 o https://bugzilla.suse.com/1179888 o https://bugzilla.suse.com/1179892 o https://bugzilla.suse.com/1179896 o https://bugzilla.suse.com/1179960 o https://bugzilla.suse.com/1179963 o https://bugzilla.suse.com/1180027 o https://bugzilla.suse.com/1180029 o https://bugzilla.suse.com/1180031 o https://bugzilla.suse.com/1180052 o https://bugzilla.suse.com/1180056 o https://bugzilla.suse.com/1180086 o https://bugzilla.suse.com/1180117 o https://bugzilla.suse.com/1180258 o https://bugzilla.suse.com/1180261 o https://bugzilla.suse.com/1180506 o https://bugzilla.suse.com/1180541 o https://bugzilla.suse.com/1180559 o https://bugzilla.suse.com/1180566 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0118-1 Rating: important References: #1040855 #1044120 #1044767 #1050242 #1050536 #1050545 #1055117 #1056653 #1056657 #1056787 #1064802 #1065729 #1066129 #1094840 #1103990 #1103992 #1104389 #1104393 #1109695 #1109837 #1110096 #1112178 #1112374 #1115431 #1118657 #1129770 #1136460 #1136461 #1138374 #1139944 #1144912 #1152457 #1163727 #1164780 #1171078 #1172145 #1172538 #1172694 #1174784 #1174852 #1176558 #1176559 #1176956 #1178270 #1178372 #1178401 #1178590 #1178634 #1178762 #1179014 #1179015 #1179045 #1179082 #1179107 #1179142 #1179204 #1179419 #1179444 #1179520 #1179578 #1179601 #1179663 #1179666 #1179670 #1179671 #1179672 #1179673 #1179711 #1179713 #1179714 #1179715 #1179716 #1179722 #1179723 #1179724 #1179745 #1179810 #1179888 #1179895 #1179896 #1179960 #1179963 #1180027 #1180029 #1180031 #1180052 #1180086 #1180117 #1180258 #1180506 #1180559 Cross-References: CVE-2018-20669 CVE-2019-20934 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466 CVE-2020-27068 CVE-2020-27777 CVE-2020-27786 CVE-2020-27825 CVE-2020-28374 CVE-2020-29660 CVE-2020-29661 CVE-2020-36158 CVE-2020-4788 Affected Products: SUSE Linux Enterprise Workstation Extension 15-SP1 SUSE Linux Enterprise Module for Live Patching 15-SP1 SUSE Linux Enterprise Module for Legacy Software 15-SP1 SUSE Linux Enterprise Module for Development Tools 15-SP1 SUSE Linux Enterprise Module for Basesystem 15-SP1 SUSE Linux Enterprise High Availability 15-SP1 ______________________________________________________________________________ An update that solves 14 vulnerabilities and has 77 fixes is now available. Description: The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372). o CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559). o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc #1179960). o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031). o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086). o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029). o CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027). o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745). o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745). o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107). o CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc# 1179663). o CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601). The following non-security bugs were fixed: o ACPI: PNP: compare the string length in the matching_id() (git-fixes). o ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes). o ACPICA: Do not increment operation_region reference counts for field units (git-fixes). o ALSA: ca0106: fix error code handling (git-fixes). o ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes). o ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes). o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes). o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes). o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes). o ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes). o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes). o ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes). o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes). o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes). o ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes). o ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes). o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes). o ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes). o ALSA: hda: Fix potential race in unsol event handler (git-fixes). o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes). o ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes). o ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes). o ALSA: line6: Perform sanity check for each URB creation (git-fixes). o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes). o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes). o ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes). o ALSA: timer: Limit max amount of slave instances (git-fixes). o ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes). o ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes). o ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes). o ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes). o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes). o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes). o ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes). o ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes). o ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes). o ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes). o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes). o ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes). o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes). o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes). o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes). o ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes). o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes). o ASoC: pcm3168a: The codec does not support S32_LE (git-fixes). o ASoC: pcm: DRAIN support reactivation (git-fixes). o ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes). o ASoC: sti: fix possible sleep-in-atomic (git-fixes). o ASoC: wm8904: fix regcache handling (git-fixes). o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes). o ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes). o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control() (git-fixes). o ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes). o ath10k: Fix an error handling path (git-fixes). o ath10k: fix backtrace on coredump (git-fixes). o ath10k: fix get invalid tx rate for Mesh metric (git-fixes). o ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes). o ath10k: Release some resources in an error handling path (git-fixes). o ath10k: Remove msdu from idr when management pkt send fails (git-fixes). o ath6kl: fix enum-conversion warning (git-fixes). o ath9k_htc: Discard undersized packets (git-fixes). o ath9k_htc: Modify byte order for an error message (git-fixes). o ath9k_htc: Silence undersized packet warnings (git-fixes). o ath9k_htc: Use appropriate rs_datalen type (git-fixes). o Avoid a GCC warning about "/*" within a comment. o backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes). o Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes). o Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes). o Bluetooth: Fix advertising duplicated flags (git-fixes). o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes). o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes). o bnxt_en: Fix race when modifying pause settings (bsc#1050242 ). o bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc# 1050242). o btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694). o btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963). o btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634). o btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784). o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes). o can: mcp251x: add error check when wq alloc failed (git-fixes). o can: softing: softing_netdev_open(): fix error handling (git-fixes). o cfg80211: initialize rekey_data (git-fixes). o cfg80211: regulatory: Fix inconsistent format argument (git-fixes). o cifs: add NULL check for ses->tcon_ipc (bsc#1178270). o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956). o cifs: fix check of tcon dfs in smb1 (bsc#1178270). o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944). o cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes). o cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes). o clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes). o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes). o clk: qcom: Allow constant ratio freq tables for rcg (git-fixes). o clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes). o clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes). o clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes). o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes). o clk: tegra: Fix duplicated SE clock entry (git-fixes). o clk: tegra: Fix Tegra PMC clock out parents (git-fixes). o clk: ti: composite: fix memory leak (git-fixes). o clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes). o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes). o clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes). o coredump: fix core_pattern parse error (git-fixes). o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes). o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes). o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes). o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes). o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes). o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes). o crypto: talitos - Fix return type of current_desc_hdr() (git-fixes). o cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes). o cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc# 1066129). o drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes). o drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes). o drm/amd/display: remove useless if/else (git-fixes). o drm/amdgpu: fix build_coefficients() argument (git-fixes). o drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes). o drm/gma500: fix double free of gma_connector (git-fixes). o drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc# 1129770) o drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes). o drm/msm/dpu: Add newline to printks (git-fixes). o drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes). o drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes). o drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes). o epoll: Keep a reference on files added to the check list (bsc#1180031). o ext4: correctly report "not supported" for {usr,grp}jquota when ! CONFIG_QUOTA (bsc#1179672). o ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716). o ext4: fix error handling code in add_new_gdb (bsc#1179722). o ext4: fix invalid inode checksum (bsc#1179723). o ext4: fix leaking sysfs kobject after failed mount (bsc#1179670). o ext4: limit entries returned when counting fsmap records (bsc#1179671). o ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc# 1179673). o extcon: max77693: Fix modalias string (git-fixes). o fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178) Backporting changes: * updated path drivers/video/fbcon/core to drivers/ video/console o fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: * updated path drivers/video/fbcon/core to drivers/video/console * context changes o firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes). o fix regression in "epoll: Keep a reference on files added to the check list" (bsc#1180031, git-fixes). o forcedeth: use per cpu to collect xmit/recv statistics (git-fixes). o fs: Do not invalidate page buffers in block_write_full_page() (bsc# 1179711). o geneve: change from tx_error to tx_dropped on missing metadata (git-fixes). o genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc# 1065729). o gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes). o gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes). o gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes). o gpio: max77620: Fixup debounce delays (git-fixes). o gpio: max77620: Use correct unit for debounce times (git-fixes). o gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes). o gpio: mvebu: fix potential user-after-free on probe (git-fixes). o gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes). o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes). o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes). o gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes). o gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes). o gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes). o gpiolib: fix up emulated open drain outputs (git-fixes). o HID: Add another Primax PIXART OEM mouse quirk (git-fixes). o HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes). o HID: core: check whether Usage Page item is after Usage ID items (git-fixes). o HID: core: Correctly handle ReportSize being zero (git-fixes). o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes). o HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052). o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes). o HID: Improve Windows Precision Touchpad detection (git-fixes). o HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes). o HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes). o HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes). o hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes). o hwmon: (jc42) Fix name to have no illegal characters (git-fixes). o i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes). o i2c: i801: Fix resume bug (git-fixes). o i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes). o i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes). o i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes). o i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes). o ibmvnic: add some debugs (bsc#1179896 ltc#190255). o ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes). o ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc# 184239 git-fixes). o ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes). o ibmvnic: enhance resetting status check during module exit (bsc#1065729). o ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes). o ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes). o ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes). o ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc# 155423 git-fixes). o ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes). o igc: Fix returning wrong statistics (bsc#1118657). o iio: adc: max1027: Reset the device at probe time (git-fixes). o iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes). o iio: bmp280: fix compensation of humidity (git-fixes). o iio: buffer: Fix demux update (git-fixes). o iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes). o iio: fix center temperature of bmc150-accel-core (git-fixes). o iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes). o iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes). o iio: srf04: fix wrong limitation in distance measuring (git-fixes). o iio:imu:bmi160: Fix too large a buffer (git-fixes). o iio:pressure:mpl3115: Force alignment of buffer (git-fixes). o inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes). o Input: ads7846 - fix integer overflow on Rt calculation (git-fixes). o Input: ads7846 - fix race that causes missing releases (git-fixes). o Input: ads7846 - fix unaligned access on 7845 (git-fixes). o Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes). o Input: cm109 - do not stomp on control URB (git-fixes). o Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes). o Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes). o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes). o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes). o Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes). o Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes). o Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes). o Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes). o Input: omap4-keypad - fix runtime PM error handling (git-fixes). o Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes). o Input: trackpoint - add new trackpoint variant IDs (git-fixes). o Input: trackpoint - enable Synaptics trackpoints (git-fixes). o Input: xpad - support Ardwiino Controllers (git-fixes). o ipw2x00: Fix -Wcast-function-type (git-fixes). o irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes). o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes). o iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes). o iwlwifi: pcie: limit memory read spin time (git-fixes). o kABI fix for g2d (git-fixes). o kABI workaround for dsa/b53 changes (git-fixes). o kABI workaround for HD-audio generic parser (git-fixes). o kABI workaround for net/ipvlan changes (git-fixes). o kABI: ath10k: move a new structure member to the end (git-fixes). o kABI: genirq: add back irq_create_mapping (bsc#1065729). o kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install o kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082) o kgdb: Fix spurious true from in_dbg_master() (git-fixes). o KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc# 1112178). o mac80211: allow rx of mesh eapol frames with default rx key (git-fixes). o mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes). o mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes). o mac80211: fix authentication with iwlwifi/mvm (git-fixes). o mac80211: fix use of skb payload instead of header (git-fixes). o mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes). o matroxfb: avoid -Warray-bounds warning (git-fixes). o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc# 1163727). o md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727). o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727). o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727). o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727). o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727). o md/cluster: block reshape with remote resync job (bsc#1163727). o md/cluster: fix deadlock when node is doing resync job (bsc#1163727). o md/raid5: fix oops during stripe resizing (git-fixes). o media: am437x-vpfe: Setting STD to current value is not an error (git-fixes). o media: cec-funcs.h: add status_req checks (git-fixes). o media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes). o media: gspca: Fix memory leak in probe (git-fixes). o media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes). o media: i2c: ov2659: Fix missing 720p register config (git-fixes). o media: i2c: ov2659: fix s_stream return value (git-fixes). o media: msi2500: assign SPI bus number dynamically (git-fixes). o media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes). o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes). o media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches). o media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes). o media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe() ' (git-fixes). o media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes). o media: si470x-i2c: add missed operations in remove (git-fixes). o media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes). o media: solo6x10: fix missing snd_card_free in error handling case (git-fixes). o media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes). o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes). o media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes). o media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes). o media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes). o media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes). o media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes). o media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes). o media: uvcvideo: Set media controller entity functions (git-fixes). o media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes). o media: v4l2-async: Fix trivial documentation typo (git-fixes). o media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes). o media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes). o mei: bus: do not clean driver pointer (git-fixes). o mei: protect mei_cl_mtu from null dereference (git-fixes). o memstick: fix a double-free bug in memstick_check (git-fixes). o memstick: r592: Fix error return in r592_probe() (git-fixes). o mfd: rt5033: Fix errorneous defines (git-fixes). o mfd: wm8994: Fix driver operation if loaded as modules (git-fixes). o mlxsw: core: Fix memory leak on module removal (bsc#1112374). o mm,memory_failure: always pin the page in madvise_inject_error (bsc# 1180258). o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204). o mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes). o net/smc: fix valid DMBE buffer sizes (git-fixes). o net/tls: Fix kmap usage (bsc#1109837). o net/tls: missing received data after fast remote close (bsc#1109837). o net/x25: prevent a couple of overflows (bsc#1178590). o net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes). o net: aquantia: fix LRO with FCS error (git-fixes). o net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ). o net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes). o net: dsa: b53: Ensure the default VID is untagged (git-fixes). o net: dsa: b53: Fix default VLAN ID (git-fixes). o net: dsa: b53: Properly account for VLAN filtering (git-fixes). o net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes). o net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes). o net: dsa: qca8k: remove leftover phy accessors (git-fixes). o net: ena: fix packet's addresses for rx_offset feature (bsc#1174852). o net: ena: handle bad request id in ena_netdev (git-fixes). o net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes). o net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes). o net: macb: add missing barriers when reading descriptors (git-fixes). o net: macb: fix dropped RX frames due to a race (git-fixes). o net: macb: fix error format in dev_err() (git-fixes). o net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes). o net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes). o net: phy: Avoid multiple suspends (git-fixes). o net: qed: fix "maybe uninitialized" warning (bsc#1136460 jsc#SLE-4691 bsc# 1136461 jsc#SLE-4692). o net: qed: fix async event callbacks unregistering (bsc#1104393 bsc# 1104389). o net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc #1136461 jsc#SLE-4692). o net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc #SLE-4691 bsc#1136461 jsc#SLE-4692). o net: seeq: Fix the function used to release some memory in an error handling path (git-fixes). o net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes). o net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes). o net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes). o net: stmmac: fix csr_clk can't be zero issue (git-fixes). o net: stmmac: Fix reception of Broadcom switches tags (git-fixes). o net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096). o net: usb: sr9800: fix uninitialized local variable (git-fixes). o net:ethernet:aquantia: Extra spinlocks removed (git-fixes). o net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc# 1056787). o nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes). o nfc: s3fwrn5: Release the nfc firmware (git-fixes). o nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes). o nfp: use correct define to return NONE fec (bsc#1109837). o NFS: fix nfs_path in case of a rename retry (git-fixes). o NFSD: Add missing NFSv2 .pc_func methods (git-fixes). o NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes). o NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes). o ocfs2: fix unbalanced locking (bsc#1180506). o ocfs2: initialize ip_next_orphan (bsc#1179724). o orinoco: Move context allocation after processing the skb (git-fixes). o parport: load lowlevel driver if ports not found (git-fixes). o PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes). o PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes). o PCI: Do not disable decoding when mmio_always_on is set (git-fixes). o PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes). o phy: Revert toggling reset changes (git-fixes). o pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes). o pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes). o pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes). o pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes). o pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes). o pinctrl: merrifield: Set default bias in case no particular value given (git-fixes). o pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes). o platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes). o platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes). o platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes). o platform/x86: mlx-platform: remove an unused variable (git-fixes). o platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes). o platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes). o PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes). o PM: ACPI: Output correct message on target power state (git-fixes). o PM: hibernate: Freeze kernel threads in software_resume() (git-fixes). o PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes). o pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes). o power: supply: bq24190_charger: fix reference leak (git-fixes). o power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes). o powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc #1065729). o powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc# 1179888 ltc#190253). o powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630). o powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes). o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc# 184630). o powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc# 184630). o powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc# 1179578 ltc#189313). o powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes). o powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729). o powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes). o powerpc/xmon: Change printk() to pr_cont() (bsc#1065729). o powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc# 184630). o powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc# 1065729). o ppp: remove the PPPIOCDETACH ioctl (git-fixes). o pwm: lp3943: Dynamically allocate PWM chip base (git-fixes). o qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc# 1050545). o qed: suppress "do not support RoCE & iWARP" flooding on HW init (bsc# 1050536 bsc#1050545). o qed: suppress false-positives interrupt error messages on HW init (bsc# 1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692). o quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714). o radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes). o ravb: Fix use-after-free ravb_tstamp_skb (git-fixes). o RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc# 1050545). o RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ). o regmap: debugfs: check count when read regmap file (git-fixes). o regmap: dev_get_regmap_match(): fix string comparison (git-fixes). o regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes). o regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes). o regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe() could be uninitialized (git-fixes). o regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ ti_abb_clear_all_txdone (git-fixes). o reiserfs: Fix oops during mount (bsc#1179715). o reiserfs: Initialize inode keys properly (bsc#1179713). o remoteproc: Fix wrong rvring index computation (git-fixes). o rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes). o rtc: 88pm860x: fix possible race condition (git-fixes). o rtc: hym8563: enable wakeup when applicable (git-fixes). o rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes). o rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes). o s390/bpf: Fix multiple tail calls (git-fixes). o s390/cpuinfo: show processor physical address (git-fixes). o s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes). o s390/dasd: fix hanging device offline processing (bsc#1144912). o s390/dasd: fix null pointer dereference for ERP requests (git-fixes). o s390/pci: fix CPU address in MSI for directed IRQ (git-fixes). o s390/qeth: fix af_iucv notification race (git-fixes). o s390/qeth: fix tear down of async TX buffers (git-fixes). o s390/qeth: make af_iucv TX notification call more robust (git-fixes). o s390/stp: add locking to sysfs functions (git-fixes). o s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes). o scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section o scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780). o scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc# 1164780). o scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc# 1164780). o scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc# 1164780). o scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780). o scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc# 1164780). o scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc# 1164780). o scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc# 1164780). o scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780). o scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780). o scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780). o scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780). o scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc# 1164780). o scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc# 1164780). o scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780). o scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc# 1164780). o scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780). o scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780). o scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780). o scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc# 1164780). o scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc# 1164780). o scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780). o scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780). o scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780). o scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780). o scsi: lpfc: Fix spelling mistake "Cant" -> "Can't" (bsc#1164780). o scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780). o scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780). o scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc# 1164780). o scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780). o scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780). o scsi: lpfc: Refactor WQE structure definitions for common use (bsc# 1164780). o scsi: lpfc: Reject CT request for MIB commands (bsc#1164780). o scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780). o scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780). o scsi: lpfc: Remove set but not used 'qp' (bsc#1164780). o scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780). o scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780). o scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780). o scsi: lpfc: Rework remote port lock handling (bsc#1164780). o scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780). o scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780). o scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780). o scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780). o scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780). o scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780). o scsi: lpfc: Use generic power management (bsc#1164780). o scsi: qla2xxx: Change post del message from debug level to log level (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc# 1179810). o scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc# 1179810). o scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc #1179810). o scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc# 1179810). o scsi: Remove unneeded break statements (bsc#1164780). o scsi: storvsc: Fix error return in storvsc_probe() (git-fixes). o scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc# 1179142 bsc#1179810). o serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes). o serial: 8250_pci: Add Realtek 816a and 816b (git-fixes). o serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes). o serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes). o serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes). o serial_core: Check for port state when tty is in error state (git-fixes). o SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558). o SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559). o SMB3: Honor lease disabling for multiuser mounts (git-fixes). o soc/tegra: fuse: Fix index bug in get_process_id (git-fixes). o soc: imx: gpc: fix power up sequencing (git-fixes). o soc: mediatek: Check if power domains can be powered on at boot time (git-fixes). o soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes). o soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes). o soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes). o spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes). o spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes). o spi: davinci: Fix use-after-free on unbind (git-fixes). o spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes). o spi: dw: Fix Rx-only DMA transfers (git-fixes). o spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes). o spi: Fix memory leak on splited transfers (git-fixes). o spi: img-spfi: fix potential double release (git-fixes). o spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes). o spi: pic32: Do not leak DMA channels in probe error path (git-fixes). o spi: pxa2xx: Add missed security checks (git-fixes). o spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes). o spi: spi-loopback-test: Fix out-of-bounds read (git-fixes). o spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes). o spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes). o spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes). o spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes). o spi: st-ssc4: add missed pm_runtime_disable (git-fixes). o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes). o spi: tegra114: fix reference leak in tegra spi ops (git-fixes). o spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes). o spi: tegra20-slink: add missed clk_unprepare (git-fixes). o spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes). o splice: only read in as much information as there is pipe buffer space (bsc #1179520). o staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes). o staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes). o staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes). o staging: olpc_dcon: add a missing dependency (git-fixes). o staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe () (git-fixes). o staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes). o staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes). o staging: rtl8188eu: fix possible null dereference (git-fixes). o staging: rtl8192u: fix multiple memory leaks on error path (git-fixes). o staging: vt6656: set usb_set_intfdata on driver fail (git-fixes). o staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes). o staging: wlan-ng: properly check endpoint types (git-fixes). o sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc# 1103992). o sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes). o sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes). o sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes). o svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc# 1103992). o svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992). o tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc# 1109837). o thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes). o timer: Fix wheel index calculation on last level (git fixes) o timer: Prevent base->clk from moving backward (git-fixes) o tty: always relink the port (git-fixes). o tty: Fix ->pgrp locking in tiocspgrp() (git-fixes). o tty: link tty and port before configuring it as console (git-fixes). o tty: synclink_gt: Adjust indentation in several functions (git-fixes). o tty: synclinkmp: Adjust indentation in several functions (git-fixes). o tty:serial:mvebu-uart:fix a wrong return (git-fixes). o uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes). o uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes). o usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes). o usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes). o usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes). o usb: dwc2: Fix IN FIFO allocation (git-fixes). o usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes). o usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes). o usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes). o usb: fsl: Check memory resource before releasing it (git-fixes). o usb: gadget: composite: Fix possible double free memory bug (git-fixes). o usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes). o usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes). o usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes). o usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes). o usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes). o usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes). o usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes). o usb: gadget: fix wrong endpoint desc (git-fixes). o usb: gadget: goku_udc: fix potential crashes in probe (git-fixes). o usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes). o usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes). o usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes). o usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init () (git-fixes). o usb: hso: Fix debug compile warning on sparc32 (git-fixes). o usb: ldusb: use unsigned size format specifiers (git-fixes). o usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes). o usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes). o usb: serial: ch341: add new Product ID for CH341A (git-fixes). o usb: serial: ch341: sort device-id entries (git-fixes). o usb: serial: digi_acceleport: clean up modem-control handling (git-fixes). o usb: serial: digi_acceleport: clean up set_termios (git-fixes). o usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes). o usb: serial: digi_acceleport: remove in_interrupt() usage. o usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes). o usb: serial: digi_acceleport: rename tty flag variable (git-fixes). o usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes). o usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes). o usb: serial: keyspan_pda: fix stalled writes (git-fixes). o usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes). o usb: serial: keyspan_pda: fix write deadlock (git-fixes). o usb: serial: keyspan_pda: fix write unthrottling (git-fixes). o usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes). o usb: serial: kl5kusb105: fix memleak on open (git-fixes). o usb: serial: mos7720: fix parallel-port state restore (git-fixes). o usb: serial: option: add Fibocom NL668 variants (git-fixes). o usb: serial: option: add interface-number sanity check to flag handling (git-fixes). o usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes). o usb: serial: option: fix Quectel BG96 matching (git-fixes). o usb: Skip endpoints with 0 maxpacket length (git-fixes). o usb: UAS: introduce a quirk to set no_write_same (git-fixes). o usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes). o usblp: poison URBs upon disconnect (git-fixes). o usbnet: ipheth: fix connectivity with iOS 14 (git-fixes). o video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes). o vt: do not hardcode the mem allocation upper bound (git-fixes). o vt: Reject zero-sized screen buffer size (git-fixes). o watchdog: coh901327: add COMMON_CLK dependency (git-fixes). o watchdog: da9062: do not ping the hw during stop() (git-fixes). o watchdog: da9062: No need to ping manually before setting timeout (git-fixes). o watchdog: qcom: Avoid context switch in restart handler (git-fixes). o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes). o wimax: fix duplicate initializer warning (git-fixes). o wireless: Use linux/stddef.h instead of stddef.h (git-fixes). o wireless: Use offsetof instead of custom macro (git-fixes). o x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc# 1112178). o x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178). o x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178). o x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178). o x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc #1112178). o x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc# 1112178). o x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178). o x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178). o x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc #1112178). o x86/tracing: Introduce a static key for exception tracing (bsc#1179895). o x86/traps: Simplify pagefault tracing logic (bsc#1179895). o x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178). o xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes). o xprtrdma: fix incorrect header size calculations (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 15-SP1: zypper in -t patch SUSE-SLE-Product-WE-15-SP1-2021-118=1 o SUSE Linux Enterprise Module for Live Patching 15-SP1: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2021-118=1 o SUSE Linux Enterprise Module for Legacy Software 15-SP1: zypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2021-118=1 o SUSE Linux Enterprise Module for Development Tools 15-SP1: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP1-2021-118=1 o SUSE Linux Enterprise Module for Basesystem 15-SP1: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2021-118=1 o SUSE Linux Enterprise High Availability 15-SP1: zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2021-118=1 Package List: o SUSE Linux Enterprise Workstation Extension 15-SP1 (x86_64): kernel-default-debuginfo-4.12.14-197.78.1 kernel-default-debugsource-4.12.14-197.78.1 kernel-default-extra-4.12.14-197.78.1 kernel-default-extra-debuginfo-4.12.14-197.78.1 o SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64): kernel-default-debuginfo-4.12.14-197.78.1 kernel-default-debugsource-4.12.14-197.78.1 kernel-default-livepatch-4.12.14-197.78.1 kernel-default-livepatch-devel-4.12.14-197.78.1 kernel-livepatch-4_12_14-197_78-default-1-3.3.1 o SUSE Linux Enterprise Module for Legacy Software 15-SP1 (aarch64 ppc64le s390x x86_64): kernel-default-debuginfo-4.12.14-197.78.1 kernel-default-debugsource-4.12.14-197.78.1 reiserfs-kmp-default-4.12.14-197.78.1 reiserfs-kmp-default-debuginfo-4.12.14-197.78.1 o SUSE Linux Enterprise Module for Development Tools 15-SP1 (aarch64 ppc64le s390x x86_64): kernel-obs-build-4.12.14-197.78.1 kernel-obs-build-debugsource-4.12.14-197.78.1 kernel-syms-4.12.14-197.78.1 o SUSE Linux Enterprise Module for Development Tools 15-SP1 (noarch): kernel-docs-4.12.14-197.78.1 kernel-source-4.12.14-197.78.1 o SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64): kernel-default-4.12.14-197.78.1 kernel-default-base-4.12.14-197.78.1 kernel-default-base-debuginfo-4.12.14-197.78.1 kernel-default-debuginfo-4.12.14-197.78.1 kernel-default-debugsource-4.12.14-197.78.1 kernel-default-devel-4.12.14-197.78.1 kernel-default-devel-debuginfo-4.12.14-197.78.1 o SUSE Linux Enterprise Module for Basesystem 15-SP1 (noarch): kernel-devel-4.12.14-197.78.1 kernel-macros-4.12.14-197.78.1 o SUSE Linux Enterprise Module for Basesystem 15-SP1 (s390x): kernel-default-man-4.12.14-197.78.1 kernel-zfcpdump-debuginfo-4.12.14-197.78.1 kernel-zfcpdump-debugsource-4.12.14-197.78.1 o SUSE Linux Enterprise High Availability 15-SP1 (aarch64 ppc64le s390x x86_64): cluster-md-kmp-default-4.12.14-197.78.1 cluster-md-kmp-default-debuginfo-4.12.14-197.78.1 dlm-kmp-default-4.12.14-197.78.1 dlm-kmp-default-debuginfo-4.12.14-197.78.1 gfs2-kmp-default-4.12.14-197.78.1 gfs2-kmp-default-debuginfo-4.12.14-197.78.1 kernel-default-debuginfo-4.12.14-197.78.1 kernel-default-debugsource-4.12.14-197.78.1 ocfs2-kmp-default-4.12.14-197.78.1 ocfs2-kmp-default-debuginfo-4.12.14-197.78.1 References: o https://www.suse.com/security/cve/CVE-2018-20669.html o https://www.suse.com/security/cve/CVE-2019-20934.html o https://www.suse.com/security/cve/CVE-2020-0444.html o https://www.suse.com/security/cve/CVE-2020-0465.html o https://www.suse.com/security/cve/CVE-2020-0466.html o https://www.suse.com/security/cve/CVE-2020-27068.html o https://www.suse.com/security/cve/CVE-2020-27777.html o https://www.suse.com/security/cve/CVE-2020-27786.html o https://www.suse.com/security/cve/CVE-2020-27825.html o https://www.suse.com/security/cve/CVE-2020-28374.html o https://www.suse.com/security/cve/CVE-2020-29660.html o https://www.suse.com/security/cve/CVE-2020-29661.html o https://www.suse.com/security/cve/CVE-2020-36158.html o https://www.suse.com/security/cve/CVE-2020-4788.html o https://bugzilla.suse.com/1040855 o https://bugzilla.suse.com/1044120 o https://bugzilla.suse.com/1044767 o https://bugzilla.suse.com/1050242 o https://bugzilla.suse.com/1050536 o https://bugzilla.suse.com/1050545 o https://bugzilla.suse.com/1055117 o https://bugzilla.suse.com/1056653 o https://bugzilla.suse.com/1056657 o https://bugzilla.suse.com/1056787 o https://bugzilla.suse.com/1064802 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1066129 o https://bugzilla.suse.com/1094840 o https://bugzilla.suse.com/1103990 o https://bugzilla.suse.com/1103992 o https://bugzilla.suse.com/1104389 o https://bugzilla.suse.com/1104393 o https://bugzilla.suse.com/1109695 o https://bugzilla.suse.com/1109837 o https://bugzilla.suse.com/1110096 o https://bugzilla.suse.com/1112178 o https://bugzilla.suse.com/1112374 o https://bugzilla.suse.com/1115431 o https://bugzilla.suse.com/1118657 o https://bugzilla.suse.com/1129770 o https://bugzilla.suse.com/1136460 o https://bugzilla.suse.com/1136461 o https://bugzilla.suse.com/1138374 o https://bugzilla.suse.com/1139944 o https://bugzilla.suse.com/1144912 o https://bugzilla.suse.com/1152457 o https://bugzilla.suse.com/1163727 o https://bugzilla.suse.com/1164780 o https://bugzilla.suse.com/1171078 o https://bugzilla.suse.com/1172145 o https://bugzilla.suse.com/1172538 o https://bugzilla.suse.com/1172694 o https://bugzilla.suse.com/1174784 o https://bugzilla.suse.com/1174852 o https://bugzilla.suse.com/1176558 o https://bugzilla.suse.com/1176559 o https://bugzilla.suse.com/1176956 o https://bugzilla.suse.com/1178270 o https://bugzilla.suse.com/1178372 o https://bugzilla.suse.com/1178401 o https://bugzilla.suse.com/1178590 o https://bugzilla.suse.com/1178634 o https://bugzilla.suse.com/1178762 o https://bugzilla.suse.com/1179014 o https://bugzilla.suse.com/1179015 o https://bugzilla.suse.com/1179045 o https://bugzilla.suse.com/1179082 o https://bugzilla.suse.com/1179107 o https://bugzilla.suse.com/1179142 o https://bugzilla.suse.com/1179204 o https://bugzilla.suse.com/1179419 o https://bugzilla.suse.com/1179444 o https://bugzilla.suse.com/1179520 o https://bugzilla.suse.com/1179578 o https://bugzilla.suse.com/1179601 o https://bugzilla.suse.com/1179663 o https://bugzilla.suse.com/1179666 o https://bugzilla.suse.com/1179670 o https://bugzilla.suse.com/1179671 o https://bugzilla.suse.com/1179672 o https://bugzilla.suse.com/1179673 o https://bugzilla.suse.com/1179711 o https://bugzilla.suse.com/1179713 o https://bugzilla.suse.com/1179714 o https://bugzilla.suse.com/1179715 o https://bugzilla.suse.com/1179716 o https://bugzilla.suse.com/1179722 o https://bugzilla.suse.com/1179723 o https://bugzilla.suse.com/1179724 o https://bugzilla.suse.com/1179745 o https://bugzilla.suse.com/1179810 o https://bugzilla.suse.com/1179888 o https://bugzilla.suse.com/1179895 o https://bugzilla.suse.com/1179896 o https://bugzilla.suse.com/1179960 o https://bugzilla.suse.com/1179963 o https://bugzilla.suse.com/1180027 o https://bugzilla.suse.com/1180029 o https://bugzilla.suse.com/1180031 o https://bugzilla.suse.com/1180052 o https://bugzilla.suse.com/1180086 o https://bugzilla.suse.com/1180117 o https://bugzilla.suse.com/1180258 o https://bugzilla.suse.com/1180506 o https://bugzilla.suse.com/1180559 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0133-1 Rating: important References: #1040855 #1044120 #1044767 #1050242 #1050536 #1050545 #1055117 #1056653 #1056657 #1056787 #1064802 #1065729 #1066129 #1094840 #1103990 #1103992 #1104389 #1104393 #1109695 #1109837 #1110096 #1112178 #1112374 #1114648 #1115431 #1118657 #1122971 #1129770 #1136460 #1136461 #1138374 #1139944 #1144912 #1152457 #1163727 #1164780 #1171078 #1172145 #1172538 #1172694 #1174784 #1174852 #1176558 #1176559 #1176956 #1177666 #1178270 #1178372 #1178401 #1178590 #1178634 #1178762 #1179014 #1179015 #1179045 #1179082 #1179107 #1179142 #1179204 #1179403 #1179406 #1179418 #1179419 #1179421 #1179444 #1179520 #1179578 #1179601 #1179616 #1179663 #1179666 #1179670 #1179671 #1179672 #1179673 #1179711 #1179713 #1179714 #1179715 #1179716 #1179722 #1179723 #1179724 #1179745 #1179810 #1179888 #1179895 #1179896 #1179960 #1179963 #1180027 #1180029 #1180031 #1180052 #1180086 #1180117 #1180258 #1180506 #1180559 Cross-References: CVE-2018-20669 CVE-2019-20934 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466 CVE-2020-27068 CVE-2020-27777 CVE-2020-27786 CVE-2020-27825 CVE-2020-28374 CVE-2020-29660 CVE-2020-29661 CVE-2020-36158 CVE-2020-4788 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Live Patching 12-SP5 SUSE Linux Enterprise High Availability 12-SP5 ______________________________________________________________________________ An update that solves 14 vulnerabilities and has 85 fixes is now available. Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2020-28374: Fixed a LIO security issue (bsc#1178372). o CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559). o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc #1179960). o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031). o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086). o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029). o CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027). o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745). o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745). o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107). o CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc# 1179663). o CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601). o CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666). o CVE-2018-20669: Fixed an improper check i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c (bsc#1122971). The following non-security bugs were fixed: o ACPI: PNP: compare the string length in the matching_id() (git-fixes). o ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes). o ACPICA: Do not increment operation_region reference counts for field units (git-fixes). o ALSA: ca0106: fix error code handling (git-fixes). o ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes). o ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes). o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes). o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes). o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes). o ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes). o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes). o ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes). o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes). o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes). o ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes). o ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes). o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes). o ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes). o ALSA: hda: Fix potential race in unsol event handler (git-fixes). o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes). o ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes). o ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes). o ALSA: line6: Perform sanity check for each URB creation (git-fixes). o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes). o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes). o ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes). o ALSA: timer: Limit max amount of slave instances (git-fixes). o ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes). o ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes). o ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes). o ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes). o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes). o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes). o ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes). o ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes). o ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes). o ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes). o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes). o ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes). o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes). o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes). o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes). o ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes). o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes). o ASoC: pcm3168a: The codec does not support S32_LE (git-fixes). o ASoC: pcm: DRAIN support reactivation (git-fixes). o ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes). o ASoC: sti: fix possible sleep-in-atomic (git-fixes). o ASoC: wm8904: fix regcache handling (git-fixes). o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes). o ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes). o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control() (git-fixes). o ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes). o ath10k: Fix an error handling path (git-fixes). o ath10k: fix backtrace on coredump (git-fixes). o ath10k: fix get invalid tx rate for Mesh metric (git-fixes). o ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes). o ath10k: Release some resources in an error handling path (git-fixes). o ath10k: Remove msdu from idr when management pkt send fails (git-fixes). o ath6kl: fix enum-conversion warning (git-fixes). o ath9k_htc: Discard undersized packets (git-fixes). o ath9k_htc: Modify byte order for an error message (git-fixes). o ath9k_htc: Silence undersized packet warnings (git-fixes). o ath9k_htc: Use appropriate rs_datalen type (git-fixes). o Avoid a GCC warning about "/*" within a comment. o backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes). o Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes). o Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes). o Bluetooth: Fix advertising duplicated flags (git-fixes). o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes). o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes). o bnxt_en: Fix race when modifying pause settings (bsc#1050242 ). o bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc# 1050242). o btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694). o btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963). o btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634). o btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784). o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes). o can: mcp251x: add error check when wq alloc failed (git-fixes). o can: softing: softing_netdev_open(): fix error handling (git-fixes). o cfg80211: initialize rekey_data (git-fixes). o cfg80211: regulatory: Fix inconsistent format argument (git-fixes). o cifs: add NULL check for ses->tcon_ipc (bsc#1178270). o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956). o cifs: fix check of tcon dfs in smb1 (bsc#1178270). o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944). o cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes). o cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes). o clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes). o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes). o clk: qcom: Allow constant ratio freq tables for rcg (git-fixes). o clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes). o clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes). o clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes). o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes). o clk: tegra: Fix duplicated SE clock entry (git-fixes). o clk: tegra: Fix Tegra PMC clock out parents (git-fixes). o clk: ti: composite: fix memory leak (git-fixes). o clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes). o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes). o clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes). o coredump: fix core_pattern parse error (git-fixes). o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes). o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes). o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes). o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes). o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes). o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes). o crypto: talitos - Fix return type of current_desc_hdr() (git-fixes). o cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes). o cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc# 1066129). o drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes). o drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes). o drm/amd/display: remove useless if/else (git-fixes). o drm/amdgpu: fix build_coefficients() argument (git-fixes). o drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes). o drm/gma500: fix double free of gma_connector (git-fixes). o drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc# 1129770) o drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes). o drm/msm/dpu: Add newline to printks (git-fixes). o drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes). o drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes). o drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes). o EDAC/i10nm: Use readl() to access MMIO registers (12sp5). o epoll: Keep a reference on files added to the check list (bsc#1180031). o ext4: correctly report "not supported" for {usr,grp}jquota when ! CONFIG_QUOTA (bsc#1179672). o ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716). o ext4: fix error handling code in add_new_gdb (bsc#1179722). o ext4: fix invalid inode checksum (bsc#1179723). o ext4: fix leaking sysfs kobject after failed mount (bsc#1179670). o ext4: limit entries returned when counting fsmap records (bsc#1179671). o ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc# 1179673). o extcon: max77693: Fix modalias string (git-fixes). o fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178) Backporting changes: * updated path drivers/video/fbcon/core to drivers/ video/console o fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: * updated path drivers/video/fbcon/core to drivers/video/console * context changes o firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes). o fix regression in "epoll: Keep a reference on files added to the check list" (bsc#1180031, git-fixes). o forcedeth: use per cpu to collect xmit/recv statistics (git-fixes). o fs: Do not invalidate page buffers in block_write_full_page() (bsc# 1179711). o geneve: change from tx_error to tx_dropped on missing metadata (git-fixes). o genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc# 1065729). o gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes). o gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes). o gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes). o gpio: max77620: Fixup debounce delays (git-fixes). o gpio: max77620: Use correct unit for debounce times (git-fixes). o gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes). o gpio: mvebu: fix potential user-after-free on probe (git-fixes). o gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes). o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes). o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes). o gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes). o gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes). o gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes). o gpiolib: fix up emulated open drain outputs (git-fixes). o HID: Add another Primax PIXART OEM mouse quirk (git-fixes). o HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes). o HID: core: check whether Usage Page item is after Usage ID items (git-fixes). o HID: core: Correctly handle ReportSize being zero (git-fixes). o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes). o HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052). o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes). o HID: Improve Windows Precision Touchpad detection (git-fixes). o HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes). o HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes). o HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes). o hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes). o hwmon: (jc42) Fix name to have no illegal characters (git-fixes). o i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes). o i2c: i801: Fix resume bug (git-fixes). o i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes). o i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes). o i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes). o i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes). o ibmvnic: add some debugs (bsc#1179896 ltc#190255). o ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes). o ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc# 184239 git-fixes). o ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes). o ibmvnic: enhance resetting status check during module exit (bsc#1065729). o ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes). o ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes). o ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes). o ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc# 155423 git-fixes). o ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes). o igc: Fix returning wrong statistics (bsc#1118657). o iio: adc: max1027: Reset the device at probe time (git-fixes). o iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes). o iio: bmp280: fix compensation of humidity (git-fixes). o iio: buffer: Fix demux update (git-fixes). o iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes). o iio: fix center temperature of bmc150-accel-core (git-fixes). o iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes). o iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes). o iio: srf04: fix wrong limitation in distance measuring (git-fixes). o iio:imu:bmi160: Fix too large a buffer (git-fixes). o iio:pressure:mpl3115: Force alignment of buffer (git-fixes). o inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes). o Input: ads7846 - fix integer overflow on Rt calculation (git-fixes). o Input: ads7846 - fix race that causes missing releases (git-fixes). o Input: ads7846 - fix unaligned access on 7845 (git-fixes). o Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes). o Input: cm109 - do not stomp on control URB (git-fixes). o Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes). o Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes). o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes). o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes). o Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes). o Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes). o Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes). o Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes). o Input: omap4-keypad - fix runtime PM error handling (git-fixes). o Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes). o Input: trackpoint - add new trackpoint variant IDs (git-fixes). o Input: trackpoint - enable Synaptics trackpoints (git-fixes). o Input: xpad - support Ardwiino Controllers (git-fixes). o ipw2x00: Fix -Wcast-function-type (git-fixes). o irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes). o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes). o iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes). o iwlwifi: pcie: limit memory read spin time (git-fixes). o kABI fix for g2d (git-fixes). o kABI workaround for dsa/b53 changes (git-fixes). o kABI workaround for HD-audio generic parser (git-fixes). o kABI workaround for net/ipvlan changes (git-fixes). o kABI workaround for usermodehelper changes (bsc#1179406). o kABI: ath10k: move a new structure member to the end (git-fixes). o kABI: genirq: add back irq_create_mapping (bsc#1065729). o kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install o kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082) o kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc #1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o kgdb: Fix spurious true from in_dbg_master() (git-fixes). o KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc# 1112178). o mac80211: allow rx of mesh eapol frames with default rx key (git-fixes). o mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes). o mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes). o mac80211: fix authentication with iwlwifi/mvm (git-fixes). o mac80211: fix use of skb payload instead of header (git-fixes). o mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes). o matroxfb: avoid -Warray-bounds warning (git-fixes). o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc# 1163727). o md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727). o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727). o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727). o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727). o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727). o md/cluster: block reshape with remote resync job (bsc#1163727). o md/cluster: fix deadlock when node is doing resync job (bsc#1163727). o md/raid5: fix oops during stripe resizing (git-fixes). o media: am437x-vpfe: Setting STD to current value is not an error (git-fixes). o media: cec-funcs.h: add status_req checks (git-fixes). o media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes). o media: gspca: Fix memory leak in probe (git-fixes). o media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes). o media: i2c: ov2659: Fix missing 720p register config (git-fixes). o media: i2c: ov2659: fix s_stream return value (git-fixes). o media: msi2500: assign SPI bus number dynamically (git-fixes). o media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes). o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes). o media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches). o media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes). o media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe() ' (git-fixes). o media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes). o media: si470x-i2c: add missed operations in remove (git-fixes). o media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes). o media: solo6x10: fix missing snd_card_free in error handling case (git-fixes). o media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes). o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes). o media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes). o media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes). o media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes). o media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes). o media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes). o media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes). o media: uvcvideo: Set media controller entity functions (git-fixes). o media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes). o media: v4l2-async: Fix trivial documentation typo (git-fixes). o media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes). o media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes). o mei: bus: do not clean driver pointer (git-fixes). o mei: protect mei_cl_mtu from null dereference (git-fixes). o memstick: fix a double-free bug in memstick_check (git-fixes). o memstick: r592: Fix error return in r592_probe() (git-fixes). o mfd: rt5033: Fix errorneous defines (git-fixes). o mfd: wm8994: Fix driver operation if loaded as modules (git-fixes). o mlxsw: core: Fix memory leak on module removal (bsc#1112374). o mm,memory_failure: always pin the page in madvise_inject_error (bsc# 1180258). o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204). o Move upstreamed bt fixes into sorted section o mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes). o net/smc: fix valid DMBE buffer sizes (git-fixes). o net/tls: Fix kmap usage (bsc#1109837). o net/tls: missing received data after fast remote close (bsc#1109837). o net/x25: prevent a couple of overflows (bsc#1178590). o net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes). o net: aquantia: fix LRO with FCS error (git-fixes). o net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ). o net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes). o net: dsa: b53: Ensure the default VID is untagged (git-fixes). o net: dsa: b53: Fix default VLAN ID (git-fixes). o net: dsa: b53: Properly account for VLAN filtering (git-fixes). o net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes). o net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes). o net: dsa: qca8k: remove leftover phy accessors (git-fixes). o net: ena: fix packet's addresses for rx_offset feature (bsc#1174852). o net: ena: handle bad request id in ena_netdev (git-fixes). o net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes). o net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes). o net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes). o net: macb: add missing barriers when reading descriptors (git-fixes). o net: macb: fix dropped RX frames due to a race (git-fixes). o net: macb: fix error format in dev_err() (git-fixes). o net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes). o net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes). o net: phy: Avoid multiple suspends (git-fixes). o net: qed: fix "maybe uninitialized" warning (bsc#1136460 jsc#SLE-4691 bsc# 1136461 jsc#SLE-4692). o net: qed: fix async event callbacks unregistering (bsc#1104393 bsc# 1104389). o net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc #1136461 jsc#SLE-4692). o net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc #SLE-4691 bsc#1136461 jsc#SLE-4692). o net: seeq: Fix the function used to release some memory in an error handling path (git-fixes). o net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes). o net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes). o net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes). o net: stmmac: fix csr_clk can't be zero issue (git-fixes). o net: stmmac: Fix reception of Broadcom switches tags (git-fixes). o net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096). o net: usb: sr9800: fix uninitialized local variable (git-fixes). o net:ethernet:aquantia: Extra spinlocks removed (git-fixes). o net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc# 1056787). o nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes). o nfc: s3fwrn5: Release the nfc firmware (git-fixes). o nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes). o nfp: use correct define to return NONE fec (bsc#1109837). o NFS: fix nfs_path in case of a rename retry (git-fixes). o NFSD: Add missing NFSv2 .pc_func methods (git-fixes). o NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes). o NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes). o ocfs2: fix unbalanced locking (bsc#1180506). o ocfs2: initialize ip_next_orphan (bsc#1179724). o orinoco: Move context allocation after processing the skb (git-fixes). o parport: load lowlevel driver if ports not found (git-fixes). o PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes). o PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes). o PCI: Do not disable decoding when mmio_always_on is set (git-fixes). o PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes). o phy: Revert toggling reset changes (git-fixes). o pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes). o pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes). o pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes). o pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes). o pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes). o pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes). o pinctrl: merrifield: Set default bias in case no particular value given (git-fixes). o pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes). o platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes). o platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes). o platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes). o platform/x86: mlx-platform: remove an unused variable (git-fixes). o platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes). o platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes). o PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes). o PM: ACPI: Output correct message on target power state (git-fixes). o PM: hibernate: Freeze kernel threads in software_resume() (git-fixes). o PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes). o pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes). o power: supply: bq24190_charger: fix reference leak (git-fixes). o power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes). o powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc #1065729). o powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc# 1179888 ltc#190253). o powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630). o powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes). o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc# 184630). o powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc# 184630). o powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc# 1179578 ltc#189313). o powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes). o powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729). o powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes). o powerpc/xmon: Change printk() to pr_cont() (bsc#1065729). o powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc# 184630). o powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc# 1065729). o ppp: remove the PPPIOCDETACH ioctl (git-fixes). o pwm: lp3943: Dynamically allocate PWM chip base (git-fixes). o qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc# 1050545). o qed: suppress "do not support RoCE & iWARP" flooding on HW init (bsc# 1050536 bsc#1050545). o qed: suppress false-positives interrupt error messages on HW init (bsc# 1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692). o quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714). o radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes). o ravb: Fix use-after-free ravb_tstamp_skb (git-fixes). o RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc# 1050545). o RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ). o reboot: fix overflow parsing reboot cpu number (bsc#1179421). o regmap: debugfs: check count when read regmap file (git-fixes). o regmap: dev_get_regmap_match(): fix string comparison (git-fixes). o regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes). o regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes). o regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe() could be uninitialized (git-fixes). o regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ ti_abb_clear_all_txdone (git-fixes). o reiserfs: Fix oops during mount (bsc#1179715). o reiserfs: Initialize inode keys properly (bsc#1179713). o remoteproc: Fix wrong rvring index computation (git-fixes). o rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes). o rtc: 88pm860x: fix possible race condition (git-fixes). o rtc: hym8563: enable wakeup when applicable (git-fixes). o rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes). o rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes). o s390/bpf: Fix multiple tail calls (git-fixes). o s390/cpuinfo: show processor physical address (git-fixes). o s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes). o s390/dasd: fix hanging device offline processing (bsc#1144912). o s390/dasd: fix null pointer dereference for ERP requests (git-fixes). o s390/pci: fix CPU address in MSI for directed IRQ (git-fixes). o s390/qeth: fix af_iucv notification race (git-fixes). o s390/qeth: fix tear down of async TX buffers (git-fixes). o s390/qeth: make af_iucv TX notification call more robust (git-fixes). o s390/stp: add locking to sysfs functions (git-fixes). o s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes). o scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section o scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780). o scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc# 1164780). o scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc# 1164780). o scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc# 1164780). o scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780). o scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc# 1164780). o scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc# 1164780). o scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc# 1164780). o scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780). o scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780). o scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780). o scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780). o scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc# 1164780). o scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc# 1164780). o scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780). o scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc# 1164780). o scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780). o scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780). o scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780). o scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc# 1164780). o scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc# 1164780). o scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780). o scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780). o scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780). o scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780). o scsi: lpfc: Fix spelling mistake "Cant" -> "Can't" (bsc#1164780). o scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780). o scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780). o scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc# 1164780). o scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780). o scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780). o scsi: lpfc: Refactor WQE structure definitions for common use (bsc# 1164780). o scsi: lpfc: Reject CT request for MIB commands (bsc#1164780). o scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780). o scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780). o scsi: lpfc: Remove set but not used 'qp' (bsc#1164780). o scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780). o scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780). o scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780). o scsi: lpfc: Rework remote port lock handling (bsc#1164780). o scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780). o scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780). o scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780). o scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780). o scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780). o scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780). o scsi: lpfc: Use generic power management (bsc#1164780). o scsi: qla2xxx: Change post del message from debug level to log level (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc# 1179810). o scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc# 1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc# 1179810). o scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc #1179810). o scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc# 1179142 bsc#1179810). o scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810). o scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc# 1179810). o scsi: Remove unneeded break statements (bsc#1164780). o scsi: storvsc: Fix error return in storvsc_probe() (git-fixes). o scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc# 1179142 bsc#1179810). o serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes). o serial: 8250_pci: Add Realtek 816a and 816b (git-fixes). o serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes). o serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes). o serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes). o serial_core: Check for port state when tty is in error state (git-fixes). o SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558). o SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559). o SMB3: Honor lease disabling for multiuser mounts (git-fixes). o soc/tegra: fuse: Fix index bug in get_process_id (git-fixes). o soc: imx: gpc: fix power up sequencing (git-fixes). o soc: mediatek: Check if power domains can be powered on at boot time (git-fixes). o soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes). o soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes). o soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes). o spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes). o spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes). o spi: davinci: Fix use-after-free on unbind (git-fixes). o spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes). o spi: dw: Fix Rx-only DMA transfers (git-fixes). o spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes). o spi: Fix memory leak on splited transfers (git-fixes). o spi: img-spfi: fix potential double release (git-fixes). o spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes). o spi: pic32: Do not leak DMA channels in probe error path (git-fixes). o spi: pxa2xx: Add missed security checks (git-fixes). o spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes). o spi: spi-loopback-test: Fix out-of-bounds read (git-fixes). o spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes). o spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes). o spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes). o spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes). o spi: st-ssc4: add missed pm_runtime_disable (git-fixes). o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes). o spi: tegra114: fix reference leak in tegra spi ops (git-fixes). o spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes). o spi: tegra20-slink: add missed clk_unprepare (git-fixes). o spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes). o splice: only read in as much information as there is pipe buffer space (bsc #1179520). o staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes). o staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes). o staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes). o staging: olpc_dcon: add a missing dependency (git-fixes). o staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe () (git-fixes). o staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes). o staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes). o staging: rtl8188eu: fix possible null dereference (git-fixes). o staging: rtl8192u: fix multiple memory leaks on error path (git-fixes). o staging: vt6656: set usb_set_intfdata on driver fail (git-fixes). o staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes). o staging: wlan-ng: properly check endpoint types (git-fixes). o sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc# 1103992). o sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes). o sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes). o sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes). o svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc# 1103992). o svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992). o tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc# 1109837). o thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes). o timer: Fix wheel index calculation on last level (git fixes) o timer: Prevent base->clk from moving backward (git-fixes) o tracing: Fix out of bounds write in get_trace_buf (bsc#1179403). o tty: always relink the port (git-fixes). o tty: Fix ->pgrp locking in tiocspgrp() (git-fixes). o tty: link tty and port before configuring it as console (git-fixes). o tty: synclink_gt: Adjust indentation in several functions (git-fixes). o tty: synclinkmp: Adjust indentation in several functions (git-fixes). o tty:serial:mvebu-uart:fix a wrong return (git-fixes). o uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes). o uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes). o usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes). o usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes). o usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes). o usb: dwc2: Fix IN FIFO allocation (git-fixes). o usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes). o usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes). o usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes). o usb: fsl: Check memory resource before releasing it (git-fixes). o usb: gadget: composite: Fix possible double free memory bug (git-fixes). o usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes). o usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes). o usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes). o usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes). o usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes). o usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes). o usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes). o usb: gadget: fix wrong endpoint desc (git-fixes). o usb: gadget: goku_udc: fix potential crashes in probe (git-fixes). o usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes). o usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes). o usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes). o usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init () (git-fixes). o usb: hso: Fix debug compile warning on sparc32 (git-fixes). o usb: ldusb: use unsigned size format specifiers (git-fixes). o usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes). o usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes). o usb: serial: ch341: add new Product ID for CH341A (git-fixes). o usb: serial: ch341: sort device-id entries (git-fixes). o usb: serial: digi_acceleport: clean up modem-control handling (git-fixes). o usb: serial: digi_acceleport: clean up set_termios (git-fixes). o usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes). o usb: serial: digi_acceleport: remove in_interrupt() usage. o usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes). o usb: serial: digi_acceleport: rename tty flag variable (git-fixes). o usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes). o usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes). o usb: serial: keyspan_pda: fix stalled writes (git-fixes). o usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes). o usb: serial: keyspan_pda: fix write deadlock (git-fixes). o usb: serial: keyspan_pda: fix write unthrottling (git-fixes). o usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes). o usb: serial: kl5kusb105: fix memleak on open (git-fixes). o usb: serial: mos7720: fix parallel-port state restore (git-fixes). o usb: serial: option: add Fibocom NL668 variants (git-fixes). o usb: serial: option: add interface-number sanity check to flag handling (git-fixes). o usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes). o usb: serial: option: fix Quectel BG96 matching (git-fixes). o usb: Skip endpoints with 0 maxpacket length (git-fixes). o usb: UAS: introduce a quirk to set no_write_same (git-fixes). o usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes). o usblp: poison URBs upon disconnect (git-fixes). o usbnet: ipheth: fix connectivity with iOS 14 (git-fixes). o usermodehelper: reset umask to default before executing user process (bsc# 1179406). o video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes). o vt: do not hardcode the mem allocation upper bound (git-fixes). o vt: Reject zero-sized screen buffer size (git-fixes). o watchdog: coh901327: add COMMON_CLK dependency (git-fixes). o watchdog: da9062: do not ping the hw during stop() (git-fixes). o watchdog: da9062: No need to ping manually before setting timeout (git-fixes). o watchdog: qcom: Avoid context switch in restart handler (git-fixes). o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes). o wimax: fix duplicate initializer warning (git-fixes). o wireless: Use linux/stddef.h instead of stddef.h (git-fixes). o wireless: Use offsetof instead of custom macro (git-fixes). o x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc# 1112178). o x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178). o x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178). o x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178). o x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc #1112178). o x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1114648). o x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc# 1112178). o x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178). o x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178). o x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc #1112178). o x86/tracing: Introduce a static key for exception tracing (bsc#1179895). o x86/traps: Simplify pagefault tracing logic (bsc#1179895). o x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178). o xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes). o xprtrdma: fix incorrect header size calculations (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 12-SP5: zypper in -t patch SUSE-SLE-WE-12-SP5-2021-133=1 o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-133=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-133=1 o SUSE Linux Enterprise Live Patching 12-SP5: zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2021-133=1 o SUSE Linux Enterprise High Availability 12-SP5: zypper in -t patch SUSE-SLE-HA-12-SP5-2021-133=1 Package List: o SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64): kernel-default-debuginfo-4.12.14-122.57.1 kernel-default-debugsource-4.12.14-122.57.1 kernel-default-extra-4.12.14-122.57.1 kernel-default-extra-debuginfo-4.12.14-122.57.1 o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): kernel-obs-build-4.12.14-122.57.1 kernel-obs-build-debugsource-4.12.14-122.57.1 o SUSE Linux Enterprise Software Development Kit 12-SP5 (noarch): kernel-docs-4.12.14-122.57.1 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): kernel-default-4.12.14-122.57.1 kernel-default-base-4.12.14-122.57.1 kernel-default-base-debuginfo-4.12.14-122.57.1 kernel-default-debuginfo-4.12.14-122.57.1 kernel-default-debugsource-4.12.14-122.57.1 kernel-default-devel-4.12.14-122.57.1 kernel-syms-4.12.14-122.57.1 o SUSE Linux Enterprise Server 12-SP5 (noarch): kernel-devel-4.12.14-122.57.1 kernel-macros-4.12.14-122.57.1 kernel-source-4.12.14-122.57.1 o SUSE Linux Enterprise Server 12-SP5 (x86_64): kernel-default-devel-debuginfo-4.12.14-122.57.1 o SUSE Linux Enterprise Server 12-SP5 (s390x): kernel-default-man-4.12.14-122.57.1 o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64): kernel-default-debuginfo-4.12.14-122.57.1 kernel-default-debugsource-4.12.14-122.57.1 kernel-default-kgraft-4.12.14-122.57.1 kernel-default-kgraft-devel-4.12.14-122.57.1 kgraft-patch-4_12_14-122_57-default-1-8.3.1 o SUSE Linux Enterprise High Availability 12-SP5 (ppc64le s390x x86_64): cluster-md-kmp-default-4.12.14-122.57.1 cluster-md-kmp-default-debuginfo-4.12.14-122.57.1 dlm-kmp-default-4.12.14-122.57.1 dlm-kmp-default-debuginfo-4.12.14-122.57.1 gfs2-kmp-default-4.12.14-122.57.1 gfs2-kmp-default-debuginfo-4.12.14-122.57.1 kernel-default-debuginfo-4.12.14-122.57.1 kernel-default-debugsource-4.12.14-122.57.1 ocfs2-kmp-default-4.12.14-122.57.1 ocfs2-kmp-default-debuginfo-4.12.14-122.57.1 References: o https://www.suse.com/security/cve/CVE-2018-20669.html o https://www.suse.com/security/cve/CVE-2019-20934.html o https://www.suse.com/security/cve/CVE-2020-0444.html o https://www.suse.com/security/cve/CVE-2020-0465.html o https://www.suse.com/security/cve/CVE-2020-0466.html o https://www.suse.com/security/cve/CVE-2020-27068.html o https://www.suse.com/security/cve/CVE-2020-27777.html o https://www.suse.com/security/cve/CVE-2020-27786.html o https://www.suse.com/security/cve/CVE-2020-27825.html o https://www.suse.com/security/cve/CVE-2020-28374.html o https://www.suse.com/security/cve/CVE-2020-29660.html o https://www.suse.com/security/cve/CVE-2020-29661.html o https://www.suse.com/security/cve/CVE-2020-36158.html o https://www.suse.com/security/cve/CVE-2020-4788.html o https://bugzilla.suse.com/1040855 o https://bugzilla.suse.com/1044120 o https://bugzilla.suse.com/1044767 o https://bugzilla.suse.com/1050242 o https://bugzilla.suse.com/1050536 o https://bugzilla.suse.com/1050545 o https://bugzilla.suse.com/1055117 o https://bugzilla.suse.com/1056653 o https://bugzilla.suse.com/1056657 o https://bugzilla.suse.com/1056787 o https://bugzilla.suse.com/1064802 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1066129 o https://bugzilla.suse.com/1094840 o https://bugzilla.suse.com/1103990 o https://bugzilla.suse.com/1103992 o https://bugzilla.suse.com/1104389 o https://bugzilla.suse.com/1104393 o https://bugzilla.suse.com/1109695 o https://bugzilla.suse.com/1109837 o https://bugzilla.suse.com/1110096 o https://bugzilla.suse.com/1112178 o https://bugzilla.suse.com/1112374 o https://bugzilla.suse.com/1114648 o https://bugzilla.suse.com/1115431 o https://bugzilla.suse.com/1118657 o https://bugzilla.suse.com/1122971 o https://bugzilla.suse.com/1129770 o https://bugzilla.suse.com/1136460 o https://bugzilla.suse.com/1136461 o https://bugzilla.suse.com/1138374 o https://bugzilla.suse.com/1139944 o https://bugzilla.suse.com/1144912 o https://bugzilla.suse.com/1152457 o https://bugzilla.suse.com/1163727 o https://bugzilla.suse.com/1164780 o https://bugzilla.suse.com/1171078 o https://bugzilla.suse.com/1172145 o https://bugzilla.suse.com/1172538 o https://bugzilla.suse.com/1172694 o https://bugzilla.suse.com/1174784 o https://bugzilla.suse.com/1174852 o https://bugzilla.suse.com/1176558 o https://bugzilla.suse.com/1176559 o https://bugzilla.suse.com/1176956 o https://bugzilla.suse.com/1177666 o https://bugzilla.suse.com/1178270 o https://bugzilla.suse.com/1178372 o https://bugzilla.suse.com/1178401 o https://bugzilla.suse.com/1178590 o https://bugzilla.suse.com/1178634 o https://bugzilla.suse.com/1178762 o https://bugzilla.suse.com/1179014 o https://bugzilla.suse.com/1179015 o https://bugzilla.suse.com/1179045 o https://bugzilla.suse.com/1179082 o https://bugzilla.suse.com/1179107 o https://bugzilla.suse.com/1179142 o https://bugzilla.suse.com/1179204 o https://bugzilla.suse.com/1179403 o https://bugzilla.suse.com/1179406 o https://bugzilla.suse.com/1179418 o https://bugzilla.suse.com/1179419 o https://bugzilla.suse.com/1179421 o https://bugzilla.suse.com/1179444 o https://bugzilla.suse.com/1179520 o https://bugzilla.suse.com/1179578 o https://bugzilla.suse.com/1179601 o https://bugzilla.suse.com/1179616 o https://bugzilla.suse.com/1179663 o https://bugzilla.suse.com/1179666 o https://bugzilla.suse.com/1179670 o https://bugzilla.suse.com/1179671 o https://bugzilla.suse.com/1179672 o https://bugzilla.suse.com/1179673 o https://bugzilla.suse.com/1179711 o https://bugzilla.suse.com/1179713 o https://bugzilla.suse.com/1179714 o https://bugzilla.suse.com/1179715 o https://bugzilla.suse.com/1179716 o https://bugzilla.suse.com/1179722 o https://bugzilla.suse.com/1179723 o https://bugzilla.suse.com/1179724 o https://bugzilla.suse.com/1179745 o https://bugzilla.suse.com/1179810 o https://bugzilla.suse.com/1179888 o https://bugzilla.suse.com/1179895 o https://bugzilla.suse.com/1179896 o https://bugzilla.suse.com/1179960 o https://bugzilla.suse.com/1179963 o https://bugzilla.suse.com/1180027 o https://bugzilla.suse.com/1180029 o https://bugzilla.suse.com/1180031 o https://bugzilla.suse.com/1180052 o https://bugzilla.suse.com/1180086 o https://bugzilla.suse.com/1180117 o https://bugzilla.suse.com/1180258 o https://bugzilla.suse.com/1180506 o https://bugzilla.suse.com/1180559 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATklONLKJtyKPYoAQihBQ/9EV/bE7ZGA6/umJ5SxPEojDGqhAPqQcoH DrxmQayYVm9mhCAClUxFvK943tjdYoNSrzDvDh9JhnK1H84AOTPl6c2e1YdpwdJ2 ol0AsDHYlhnbYlrBoZTxoGHofDhUgCVxHawBnq+mvBZ2gfEAvKJ5unD1QOXWcSiL vl1sKD5wEx7nOAWN5K+iwNav789WM0QGkHzwi4Bu46K8lr4l3Av8Fcl7GJJRJ4IL Tmc9v4b1NxwgPqnQdMbDVk6ZE+kKdoyKzEAdLnCR6la+J+x8j/8hVyjCQcTid0ia uc+CDnQE0WP+ke8Hpvd7WdhEn0AVPW81VKImBwH6ux7t1cE48y89YRQ6JF/+gBWo dv/2zms4p2vOYDLa93XxrbWiQfCwDCdSLhsbVK6nhen5PXYgag0p0JFx01KkfuNt 2q3pJ6UdROP6kyWKOCzvQfqvyP8dGTOsbq2j4mhyHjNMEz6J42h6Ch0eIkr11QBy bMlCMLAAj9/e8EenvrzSWluts3znXJfP9IoXXQ/rnP/8E0OJNvHQSCU+KnA0ayTk TqFqU9ssYiNnGxDckvI2Ku4g8RCd4uXCdXldMt2CLA2mfsBF4YKmnYUmbjry3k83 ugmSBAWZANMQElNgSYF4gV4eZxuI1pjmQGJ3a07++Q7ASpLwYB+l+LvTkiKgw9a3 bfEp4+CKcEI= =uAJS -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2020.4482.2 - UPDATE [Appliance] BIG-IP Products: Cross-site scripting - Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.4482.2 BIG-IP Products - Configuration utility XSS vulnerability CVE-2020-27719 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: BIG-IP Products Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-27719 Original Bulletin: https://support.f5.com/csp/article/K19166530 Revision History: January 18 2021: Vendor updated mitigation section December 18 2020: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- K19166530: XSS vulnerability CVE-2020-27719 Original Publication Date: 17 Dec, 2020 Latest Publication Date: 16 Jan, 2021 Security Advisory Description A cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. (CVE-2020-27719) Impact An attacker can exploit this vulnerability to run JavaScript in the context of the currently logged-in user. An administrative user with access to the Advanced Shell (bash) who successfully exploits this vulnerability can completely compromise the BIG-IP system through remote code execution. Security Advisory Status F5 Product Development has assigned ID 928321 (BIG-IP) to this vulnerability. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning. +----------------+------+----------+----------+----------+------+-------------+ | | |Versions |Fixes | |CVSSv3|Vulnerable | |Product |Branch|known to |introduced|Severity |score^|component or | | | |be |in | |1 |feature | | | |vulnerable| | | | | +----------------+------+----------+----------+----------+------+-------------+ | |16.x |16.0.0 |16.0.1 | | | | | +------+----------+----------+ | | | | |15.x |15.0.0 - |15.1.1 | | | | | | |15.1.0 | | | | | |BIG-IP (LTM, +------+----------+----------+ | | | |AAM, Advanced |14.x |14.1.0 - |14.1.3.1 | | | | |WAF, AFM, | |14.1.3 | | | | | |Analytics, APM, +------+----------+----------+High |7.5 |Configuration| |ASM, DDHD, DNS, |13.x |None |Not | | |utility | |FPS, GTM, Link | | |applicable| | | | |Controller, PEM,+------+----------+----------+ | | | |SSLO) |12.x |None |Not | | | | | | | |applicable| | | | | +------+----------+----------+ | | | | |11.x |None |Not | | | | | | | |applicable| | | | +----------------+------+----------+----------+----------+------+-------------+ | |7.x |None |Not | | | | | | | |applicable| | | | |BIG-IQ +------+----------+----------+ | | | |Centralized |6.x |None |Not |Not |None |None | |Management | | |applicable|vulnerable| | | | +------+----------+----------+ | | | | |5.x |None |Not | | | | | | | |applicable| | | | +----------------+------+----------+----------+----------+------+-------------+ |Traffix SDC |5.x |None |Not |Not |None |None | | | | |applicable|vulnerable| | | +----------------+------+----------+----------+----------+------+-------------+ ^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Security Advisory Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Fixes introduced in column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation To mitigate this vulnerability, you should permit management access to F5 products only over a secure network, and limit access to only trusted users. For more information about securing access to BIG-IP systems, refer to K13092: Overview of securing access to the BIG-IP system. The trusted users with access to the Configuration utility should take precaution when selecting hyperlinks from untrusted or unknown sources. The attack for this vulnerability is most likely to happen in the form of a phishing attack. Acknowledgements F5 acknowledges Kevin Breen for bringing this issue to our attention and following the highest standards of coordinated disclosure. Supplemental Information o K41942608: Overview of security advisory articles o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATUMuNLKJtyKPYoAQj26hAAo2L1HF8NCBLnbWHbrZRa587MHOoh9vwN ahIBfhHVNHw03bUkpVpd5UEav77WcR0yuYJG0dqKMj08pRwqllBvNjVbqiH6iheM UqOseD5jbCJfDY+8i3UzxVTBoOfatO4u0BWDwnXWem9iu53jua/ef1JJKG/g6ZpG F/hyJRulyAPv+WU+/dr0eLv08Invs5t3yJffOfum3HCKsr0Sl3aEcuOz67i5/Cpg LQqqwd/TxPJ7vkm/7oTmls7xJt0L1BNhxhcUaQ1YRA6+dM6bxkde1UYvJLJu6t7X cnNJhShobdS4dTSMhw4RVh/tXIOi1hZLuJ3EbMABQtHAgjMqBplhmU7UAaDr6GTx JCgoqKnqAPGzM7nlgel9jsUufNrutIZu7eRptzf7hOcgMCvL+arMWm1vQplMifIS tJjuyVyyp/lWl1NIsf7rh2v9wGwBtmjmT6ahSuQLqsMXQdg4fU60zIF+Sh+Jy/K4 +aOM3KC/YUKKFJvN8rDIWNUUDuAcT9+UfoVqJARboWr7lFu9BcyNbGsQtxnWklFX +wLrQZMcKXCsQxbJSSvOQ8awlgwpq8KXAQuNS/VrZRc/Eu1JmmFeGv+VtSeVY/4L zUQGwgecqlj0V5qihuEdBFhJXOsS+4ijjma/FMmgxeh2S8jMdxv36xoMVX2mLxTP 0TXa6EF19Mg= =mtdZ -----END PGP SIGNATURE-----
4 óra 34 perc

ESB-2020.4371.3 - UPDATE [Appliance] BIG-IP: Access privileged data - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.4371.3 OpenSSL vulnerability CVE-2020-1968 18 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: BIG-IP Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Access Privileged Data -- Remote/Unauthenticated Resolution: Mitigation CVE Names: CVE-2020-1968 Reference: ESB-2020.4298 ESB-2020.3493 ESB-2020.3318 ESB-2020.3170 Original Bulletin: https://support.f5.com/csp/article/K92451315 Revision History: January 18 2021: Vendor issued minor update January 4 2021: Additional mitigation instructions added by vendor December 11 2020: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- K92451315: OpenSSL vulnerability CVE-2020-1968 Original Publication Date: 11 Dec, 2020 Latest Publication Date: 16 Jan, 2021 Security Advisory Description The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v). (CVE-2020-1968) Impact An attacker may be able to exploit OpenSSL Transport Layer Security (TLS), which allows unauthorized exposure of information when Diffie-Hellman (DH) secrets are reused across multiple TLS connections. Security Advisory Status F5 Product Development has assigned ID 945421 (BIG-IP) to this vulnerability. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning. +------------------+------+----------+----------+----------+------+-----------+ | | |Versions |Fixes | |CVSSv3|Vulnerable | |Product |Branch|known to |introduced|Severity |score^|component | | | |be |in | |1 |or feature | | | |vulnerable| | | | | +------------------+------+----------+----------+----------+------+-----------+ | |16.x |16.0.0 - |None | | | | | | |16.0.1 | | | | | | +------+----------+----------+ | | | | |15.x |15.1.0 - |None | | | | | | |15.1.2 | | | | | |BIG-IP (LTM, AAM, +------+----------+----------+ | | | |Advanced WAF, AFM,|14.x |14.1.0 - |None | | |TLS | |Analytics, APM, | |14.1.3 | | | |connections| |ASM, DDHD, DNS, +------+----------+----------+Medium |5.9 |(OpenSSL, | |FPS, GTM, Link |13.x |13.1.0 - |None | | |SSL | |Controller, PEM, | |13.1.3 | | | |profiles) | |SSLO) +------+----------+----------+ | | | | |12.x |12.1.0 - |None | | | | | | |12.1.5 | | | | | | +------+----------+----------+ | | | | |11.x |11.6.1 - |None | | | | | | |11.6.5 | | | | | +------------------+------+----------+----------+----------+------+-----------+ | |7.x |None |Not | | | | | | | |applicable| | | | | +------+----------+----------+ | | | |BIG-IQ Centralized|6.x |None |Not |Not |None |None | |Management | | |applicable|vulnerable| | | | +------+----------+----------+ | | | | |5.x |None |Not | | | | | | | |applicable| | | | +------------------+------+----------+----------+----------+------+-----------+ |Traffix SDC |5.x |None |Not |Not |None |None | | | | |applicable|vulnerable| | | +------------------+------+----------+----------+----------+------+-----------+ ^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Security Advisory Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Fixes introduced in column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation To mitigate this vulnerability, you can disable DH ciphersuites key exchanges in the vulnerable components. The Elliptic Curve Diffie-Hellman (ECDH) ciphersuites exchanges are not affected. To disable the DH ciphersuites in the SSL profile, perform the following procedure: Impact of procedure: Performing the following procedure should not have a negative impact on your system. The changes take effect when you associate the new SSL profile to a virtual server. 1. Log in to the Configuration utility. 2. Go to Local Traffic > Profiles > SSL > Client. 3. Select Create. 4. For the new profile, under General Properties, enter a name. 5. Set Configuration to Advanced. 6. For Ciphers, select the Custom check box. 7. For Ciphers, select Cipher Suites. Note: In BIG-IP 13.x, select Cipher String. In BIG-IP 11.x through 12.x, skip this step. 8. For Ciphers, enter a cipher string. For example, to disable the TLSv1 protocol and DHE ciphers, use the following syntax: DEFAULT:!TLSv1:!DHE 9. Configure the remaining profile settings. 10. Select Finished. For more information about configuring ciphers on SSL profiles, refer to K13171: Configuring the cipher strength for SSL profiles (11.x). Additionally, to mitigate this vulnerability, you should permit management access to F5 products only over a secure network and restrict command line access for affected systems to trusted users. For more information, refer to K13309: Restricting access to the Configuration utility by source IP address (11.x - 16.x) and K13092: Overview of securing access to the BIG-IP system. Supplemental Information o K41942608: Overview of security advisory articles o K91158923: BIG-IP SSL/TLS ADH/DHE vulnerability CVE-2020-5929 o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K48955220: Installing an OPSWAT Endpoint Security update on BIG-IP APM systems (11.4.x and later) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYATURONLKJtyKPYoAQgRLA/9FHAFZ9KIXXTPaHf/GcIX5ljcKK2sbRo3 r1OjlZ3oNdmuqy5hozkCEa4Aoo0ZwIwUlITZizz4b+Pyc678Onav3MxV2oeRVfkb LmQsO5pCKW5PnL7C7iovsUiAHG+zspOqpFDFeKf8U0M78EOL3oW8OdcGyMpdd2nZ a1RyqTZB2nd6+ntlqtz53G1i/0yh9RyRv0/94Rc5ko0PkBJ9b2Udpwr23i3KX+yt gGdElc8IfgduzfaqxLGHomwB+OKmFFsS3EWkTkqf9TfwE7K0eqLMwqex+LNflaJy N3Hw5g3MhF1awx9aQHRyiYcjw92QPU55hPqxLGvMNljNo/JeH/Mj9p6K5TlBA1JO exQpixeGwveNzsARuR2z3v/FLYhfpeLogLNDYKDjAJOLCIc9ChqwawZl+1FV2IYX 3iKWVjOtZeqScil5kSDdyMrWBYIZThVTeSfAhpiIQULselrDS/ly5POyGgi/tuTI UmyFVmYQzO4cKaD3OZnQOQz2RejbJouOIfmSnH3V8BAuirMAB/l/90IohrpXuCVd cdbbaaYCHX493Zgs4Cewv0VPR+F3/u0gHX8FjhoKbUq+W0LCZsarOTZ1x1oVWHwz HISfrhzUfxR+JCWzKKDXXsb53TFoH0LA5cwu2SMuCdfKnnMr2rDnk/Dmj1qy8e2M 6yT+qb6WmWs= =gMEL -----END PGP SIGNATURE-----
2021. január 15.

ESB-2021.0191 - [Win][UNIX/Linux] Jenkins: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0191 Jenkins Security Advisory 2021-01-13 15 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Jenkins Core Jenkins plugins Publisher: Jenkins Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Overwrite Arbitrary Files -- Existing Account Cross-site Scripting -- Remote with User Interaction Denial of Service -- Existing Account Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-21614 CVE-2021-21613 CVE-2021-21612 CVE-2021-21611 CVE-2021-21610 CVE-2021-21609 CVE-2021-21608 CVE-2021-21607 CVE-2021-21606 CVE-2021-21605 CVE-2021-21604 CVE-2021-21603 CVE-2021-21602 CVE-2018-1000862 Original Bulletin: https://www.jenkins.io/security/advisory/2021-01-13/ - --------------------------BEGIN INCLUDED TEXT-------------------- Jenkins Security Advisory 2021-01-13 This advisory announces vulnerabilities in the following Jenkins deliverables: * Jenkins (core) * Bumblebee HP ALM Plugin * TICS Plugin * TraceTronic ECU-TEST Plugin Descriptions XSS vulnerability in notification bar SECURITY-1889 / CVE-2021-21603 Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents (typically shown after form submissions via Apply button). This results in a cross-site scripting (XSS) vulnerability exploitable by attackers able to influence notification bar contents. Jenkins 2.275, LTS 2.263.2 escapes the content shown in notification bars. Stored XSS vulnerability in button labels SECURITY-2035 / CVE-2021-21608 Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI. This results in a cross-site scripting vulnerability exploitable by attackers with the ability to control button labels. An example of buttons with a user-controlled label are the buttons of the Pipeline input step. Jenkins 2.275, LTS 2.263.2 escapes button labels in the Jenkins UI. Reflected XSS vulnerability in markup formatter preview SECURITY-2153 / CVE-2021-21610 Jenkins allows administrators to choose the markup formatter to use for descriptions of jobs, builds, views, etc. displayed in Jenkins. When editing such a description, users can choose to have Jenkins render a formatted preview of the description they entered. Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any restrictions for the URL rendering the formatted preview of markup passed as a query parameter. This results in a reflected cross-site scripting (XSS) vulnerability if the configured markup formatter does not prohibit unsafe elements (JavaScript) in markup, like Anything Goes Formatter Plugin. Jenkins 2.275, LTS 2.263.2 requires that preview URLs are accessed using POST and sets Content-Security-Policy headers that prevent execution of unsafe elements when the URL is accessed directly. In case of problems with this change, these protections can be disabled by setting the Java system properties Note hudson.markup.MarkupFormatter.previewsAllowGET to true and/or hudson.markup.MarkupFormatter.previewsSetCSP to false. Doing either is discouraged. Stored XSS vulnerability on new item page SECURITY-2171 / CVE-2021-21611 Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types. As of the publication of this advisory, the Jenkins security team is not Note aware of any plugins published via the Jenkins project update center that allow doing this. Jenkins 2.275, LTS 2.263.2 escapes display names and IDs of item types shown on the New Item page. Improper handling of REST API XML deserialization errors SECURITY-1923 / CVE-2021-21604 Jenkins provides XML REST APIs to configure views, jobs, and other items. When deserialization fails because of invalid data, Jenkins 2.274 and earlier, LTS 2.263.1 and earlier stores invalid object references created through these endpoints in the Old Data Monitor. If an administrator discards the old data, some erroneous data submitted to these endpoints may be persisted. This allows attackers with View/Create, Job/Create, Agent/Create, or their respective */Configure permissions to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects when discarded by an administrator. Jenkins 2.275, LTS 2.263.2 does not record submissions from users in Old Data Monitor anymore. In case of problems, the Java system properties hudson.util.RobustReflectionConverter.recordFailuresForAdmins and hudson.util.RobustReflectionConverter.recordFailuresForAllAuthentications can be set to true to record configuration data submissions from administrators or all users, partially or completely disabling this fix. Arbitrary file read vulnerability in workspace browsers SECURITY-1452 / CVE-2021-21602 The file browser for workspaces, archived artifacts, and $JENKINS_HOME/ userContent/ follows symbolic links to locations outside the directory being browsed in Jenkins 2.274 and earlier, LTS 2.263.1 and earlier. This allows attackers with Job/Workspace permission and the ability to control workspace contents (e.g., with Job/Configure permission or the ability to change SCM contents) to create symbolic links that allow them to access files outside workspaces using the workspace browser. Note This issue is caused by an incomplete fix for SECURITY-904 / CVE-2018-1000862 in the 2018-12-08 security advisory. Jenkins 2.275, LTS 2.263.2 no longer supports symlinks in workspace browsers. While they may still exist on the file system, they are no longer shown on the UI, accessible via URLs, or included in directory content downloads. This fix only changes the behavior of the Jenkins UI. Archiving artifacts still behaves as before. Path traversal vulnerability in agent names SECURITY-2021 / CVE-2021-21605 Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/ Configure permission to choose agent names that cause Jenkins to override unrelated config.xml files. If the global config.xml file is replaced, Jenkins will start up with unsafe legacy defaults after a restart. Jenkins 2.275, LTS 2.263.2 ensures that agent names are considered valid names for items to prevent this problem. In case of problems, this change can be reverted by setting the Java system property jenkins.model.Nodes.enforceNameRestrictions to false. Arbitrary file existence check in file fingerprints SECURITY-2023 / CVE-2021-21606 Jenkins provides a feature for jobs to store and track fingerprints of files used during a build. Jenkins 2.274 and earlier, LTS 2.263.1 and earlier provides a REST API to check where a given fingerprint was used by which builds. This endpoint does not fully validate that the provided fingerprint ID is properly formatted before checking for the XML metadata for that fingerprint on the controller file system. This allows attackers with Overall/Read permission to check for the existence of XML files on the controller file system where the relative path can be constructed as 32 characters. Jenkins 2.275, LTS 2.263.2 validates that a fingerprint ID is properly formatted before checking for its existence. Excessive memory allocation in graph URLs leads to denial of service SECURITY-2025 / CVE-2021-21607 Jenkins renders several different graphs for features like agent and label usage statistics, memory usage, or various plugin-provided statistics. Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit the graph size provided as query parameters. This allows attackers to request or to have legitimate Jenkins users request crafted URLs that rapidly use all available memory in Jenkins, potentially leading to out of memory errors. Jenkins 2.275, LTS 2.263.2 limits the maximum size of graphs to an area of 10 million pixels. If a larger size is requested, the default size for the graph will be rendered instead. This threshold can be configured by setting the Java system property hudson.util.Graph.maxArea to a different number on startup. Missing permission check for paths with specific prefix SECURITY-2047 / CVE-2021-21609 Jenkins includes a static list of URLs that are always accessible even without Overall/Read permission, such as the login form. These URLs are excluded from an otherwise universal permission check. Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly compare requested URLs with that list. This allows attackers without Overall/Read permission to access plugin-provided URLs with any of the following prefixes if no other permissions are required: * accessDenied * error * instance-identity * login * logout * oops * securityRealm * signup * tcpSlaveAgentListener For example, a plugin contributing the path loginFoo/ would have URLs in that space accessible without the default Overall/Read permission check. The Jenkins security team is not aware of any affected plugins as of the publication of this advisory. The comparison of requested URLs with the list of always accessible URLs has been fixed to only allow access to the specific listed URLs in Jenkins 2.275, LTS 2.263.2. In case this change causes problems, additional paths can be made accessible without Overall/Read permissions: The Java system property jenkins.model.Jenkins.additionalReadablePaths is a comma-separated list of additional path prefixes to allow access to. Credentials stored in plain text by TraceTronic ECU-TEST Plugin SECURITY-2057 / CVE-2021-21612 TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file de.tracetronic.jenkins.plugins.ecutest.report.atx.installation.ATXInstallation.xml on the Jenkins controller as part of its configuration. These credentials can be viewed by users with access to the Jenkins controller file system. TraceTronic ECU-TEST Plugin 2.24 adds a new option type for sensitive options. Previously stored credentials are migrated to that option type on Jenkins startup. XSS vulnerability in TICS Plugin SECURITY-2098 / CVE-2021-21613 TICS Plugin 2020.3.0.6 and earlier does not escape TICS service responses. This results in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control TICS service response content. TICS Plugin 2020.3.0.7 escapes TICS service responses, or strips HTML out, as appropriate. Credentials stored in plain text by Bumblebee HP ALM Plugin SECURITY-2156 / CVE-2021-21614 Bumblebee HP ALM Plugin 4.1.5 and earlier stores credentials unencrypted in its global configuration file com.agiletestware.bumblebee.BumblebeeGlobalConfig.xml on the Jenkins controller as part of its configuration. These credentials can be viewed by users with access to the Jenkins controller file system. Bumblebee HP ALM Plugin 4.1.6 stores credentials encrypted once its configuration is saved again. Severity * SECURITY-1452: Medium * SECURITY-1889: High * SECURITY-1923: High * SECURITY-2021: High * SECURITY-2023: Medium * SECURITY-2025: Medium * SECURITY-2035: High * SECURITY-2047: Low * SECURITY-2057: Low * SECURITY-2098: High * SECURITY-2153: High * SECURITY-2156: Low * SECURITY-2171: High Affected Versions * Jenkins weekly up to and including 2.274 * Jenkins LTS up to and including 2.263.1 * Bumblebee HP ALM Plugin up to and including 4.1.5 * TICS Plugin up to and including 2020.3.0.6 * TraceTronic ECU-TEST Plugin up to and including 2.23.1 Fix * Jenkins weekly should be updated to version 2.275 * Jenkins LTS should be updated to version 2.263.2 * Bumblebee HP ALM Plugin should be updated to version 4.1.6 * TICS Plugin should be updated to version 2020.3.0.7 * TraceTronic ECU-TEST Plugin should be updated to version 2.24 These versions include fixes to the vulnerabilities described above. All prior versions are considered to be affected by these vulnerabilities unless otherwise indicated. Credit The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities: * Daniel Beck, CloudBees, Inc. for SECURITY-2047, SECURITY-2098, SECURITY-2153 * Ismail Aydemir at d0nkeysec.org for SECURITY-1923 * Jeff Thompson, CloudBees, Inc., Matt Sicker, CloudBees, Inc., and Wadeck Follonier, CloudBees, Inc. for SECURITY-1889 * Jesse Glick, CloudBees, Inc. and Wadeck Follonier, CloudBees, Inc. for SECURITY-2171 * Long Nguyen, Viettel Cyber Security for SECURITY-2057 * Matt Sicker, CloudBees, Inc. and Jesse Glick, CloudBees, Inc. for SECURITY-2035 * Son Nguyen (@s0nnguy3n_) for SECURITY-2156 * Travis Emmert from Apple Information Security for SECURITY-1452 * Wadeck Follonier, CloudBees, Inc. for SECURITY-2021, SECURITY-2023, SECURITY-2025 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAEm7eNLKJtyKPYoAQgj4g//UPyJgUofhRSVnxqcO8AUpGyunS+ABD02 cseNgYy6xlsG3GIuAwPw6e1NAmVKXtfqQH6PkFvnyFecdYpRNqmRaolAEeqM7Ddw yxAOan2mcIa/s6ldkCleGmA08kUvVm0mT+rSY+vRFP2uB4YOB08WivKfSi1w0mE0 3YtHj40MntVTOlqte/9m+AfpRVXWL2xgVHkCaESLk21V0dvnGohhyT7hUwltdp8W eVUotLkgvEHntK0ZY6Epb+RIpq3p9XdSsimofRQLL+D5FzRUCi0CSS7xNQC4eN58 hyDtGeIDFgZPwA62maoGss7pLsOEKwtYb3cl81WeuDBM8jkeWCdOPfCdVi8WPpCf gc3Y6w98CIm6IdgBBGJoatBRb+K3Iv23fHbkZgMppM1CIcZ5prwLBL21VCG38fT6 m7hAixC/RrEsHw/XM6A9OYUcnJ/tFuI7zXNFgx12O9KmuFCZFulKBJkXDhP+z9Rn /oWATmjatT8SYaRn80tSQpiz46CWARczbITl/yqAmZLtWUqU3Vnh8Gil7wvy5r40 WsqDnBay9ekqAXljxRDZ+3ZdqrwCAlj4vyhoXNNTdMGPUxeJ8w0VgB3HhYw/KWAL PIgJqxyit2JIRdJ6bzihWMMvZFe7o9DtzCMm/N2i8fAKg1lQmfPwdJen6R8l9JMa IWD/chqif7E= =69Ci -----END PGP SIGNATURE-----
2021. január 15.

ESB-2021.0190 - [Win][UNIX/Linux] Joomla! Core: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0190 Joomla Security Announcements: 20210101, 20210102, 20210103 15 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Joomla! Core Publisher: Joomla project Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Unknown/Unspecified Resolution: Patch/Upgrade CVE Names: CVE-2021-23125 CVE-2021-23124 CVE-2021-23123 Original Bulletin: http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/R649UlnsWcE/836-20210101-core-com-modules-exposes-module-names.html http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/K1E_p7cgYyI/837-20210102-core-xss-in-mod-breadcrumbs-aria-label-attribute.html http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/bx6liB_wMaw/838-20210103-core-xss-in-com-tags-image-parameters.html Comment: This bulletin contains three (3) Joomla project security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- [20210101] - Core - com_modules exposes module names Project: Joomla! SubProject: CMS Impact: Low Severity: Low Versions: 3.0.0 - 3.9.23 Exploit type: Incorrect Access Control Reported Date: 2020-07-07 Fixed Date: 2021-01-12 CVE Number: CVE-2021-23123 Description Lack of ACL checks in the order Position endpoint of com_modules leak names of unpublished and/or inaccessible modules. Affected Installs Joomla! CMS versions 3.0.0 - 3.9.23 Solution Upgrade to version 3.9.24 Contact The JSST at the Joomla! Security Centre. Reported By: Phil Taylor - -------------------------------------------------------------------------------- [20210102] - Core - XSS in mod_breadcrumbs aria-label attribute Project: Joomla! SubProject: CMS Impact: Moderate Severity: Low Versions:3.9.0 - 3.9.23 Exploit type: XSS Reported Date: 2020-09-01 Fixed Date: 2021-01-12 CVE Number: CVE-2021-23124 Description Lack of escaping in mod_breadcrumbs aria-label attribute allows XSS attacks. Affected Installs Joomla! CMS versions 3.9.0 - 3.9.23 Solution Upgrade to version 3.9.24 Contact The JSST at the Joomla! Security Centre. Reported By: Sarunas Paulauskas - -------------------------------------------------------------------------------- [20210103] - Core - XSS in com_tags image parameters Project: Joomla! SubProject: CMS Impact: Moderate Severity: Low Versions:3.1.0 - 3.9.23 Exploit type: XSS Reported Date: 2020-09-01 Fixed Date: 2021-01-12 CVE Number: CVE-2021-23125 Description Lack of escaping of image-related parameters in multiple com_tags views cause lead to XSS attack vectors. Affected Installs Joomla! CMS versions 3.1.0 - 3.9.23 Solution Upgrade to version 3.9.24 Contact The JSST at the Joomla! Security Centre. Reported By: Sarunas Paulauskas - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAEPLeNLKJtyKPYoAQiByQ/9EUx2xoLQA0EpksmS49Kc4YGK/Y1qA4lk a1jLr+ahRAyRIz8JqoNNotpqwOiewZy6D5KGRzNEKA7XVn1zSLH2VqmUg3LzZmXW AZ+Ush5fyuOxYVePC7/Pyr+1TBCL4HXjgHiivY89DbG5eoohpSYEdA9uI4OFS/tm pKRHlkqUUllWUABHlh6YtbW2Rsyq9GUzHafeP1rGhLH4L9JJf0MTSSeDIjoBt3tm zD85Vu22lcRfy9VcC6Nfg9LiUShjXAHv9q2po4mzg01F+BRgJlYSoigIW92Ex9Ml cM55B4SM4zv13OjuSLJBCcuhYfK4ScfmPxIXt/BDpoj6QBQj8iIDxNG2bjCc6jov EBrtzc3Xb/o6qlm9C6tAvs9Hji4/3lFW7Qes9m6ASLeANHsk3dqJksueOEKiZ2Je SLgapWMth7zxa8+Q6hpY9QdaWoCTse7Hrkolm1QsFjLk4W4v7km+b3qjS81EcFWV 0RaYwX2dBU/utHvZnLATvN+ALkmOMuy/hx2GGwOu2Rb6GS5HmSSGlTv8XKmm90FD kaqaJ06KEODAxqI/9byx3dHFpS5sBzQDhb0OFFoifb2psQGHj+FHLdlTuSlF/ipd WrPKIMEKCKfc0Zke6NG0CZ/tNyZpr4Z/4lvDW/OsrHyMLn47zO8Q6/oLf3tDMdVT QKvOjTO3kqE= =Zxoc -----END PGP SIGNATURE-----
2021. január 15.

ESB-2021.0189 - [SUSE] linux kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0189 Security update for the Linux Kernel 15 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: linux kernel Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Root Compromise -- Existing Account Access Privileged Data -- Existing Account Modify Arbitrary Files -- Existing Account Denial of Service -- Existing Account Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-36158 CVE-2020-29661 CVE-2020-29660 CVE-2020-29373 CVE-2020-29370 CVE-2020-28374 CVE-2020-27830 CVE-2020-27825 CVE-2020-27786 CVE-2020-27777 CVE-2020-27068 CVE-2020-11668 CVE-2020-4788 CVE-2020-0466 CVE-2020-0465 CVE-2020-0444 CVE-2019-20934 CVE-2018-20669 Reference: ESB-2021.0166 ESB-2020.4410 ESB-2020.4275.2 ESB-2020.3888 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210117-1 https://www.suse.com/support/update/announcement/2021/suse-su-20210118-1 Comment: This bulletin contains two (2) SUSE security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0117-1 Rating: moderate References: #1040855 #1044120 #1044767 #1055117 #1065729 #1094840 #1109695 #1115431 #1138374 #1139944 #1149032 #1152457 #1152472 #1152489 #1155518 #1156315 #1156395 #1158775 #1161099 #1163727 #1165933 #1167657 #1168952 #1171000 #1171078 #1171688 #1172145 #1172733 #1174486 #1175079 #1175480 #1175995 #1176396 #1176942 #1176956 #1177326 #1177500 #1177666 #1177679 #1177733 #1178049 #1178203 #1178270 #1178372 #1178590 #1178612 #1178634 #1178660 #1178756 #1178780 #1179107 #1179204 #1179419 #1179434 #1179435 #1179519 #1179575 #1179578 #1179601 #1179604 #1179639 #1179652 #1179656 #1179670 #1179671 #1179672 #1179673 #1179675 #1179676 #1179677 #1179678 #1179679 #1179680 #1179681 #1179682 #1179683 #1179684 #1179685 #1179687 #1179688 #1179689 #1179690 #1179703 #1179704 #1179707 #1179709 #1179710 #1179711 #1179712 #1179713 #1179714 #1179715 #1179716 #1179745 #1179763 #1179888 #1179892 #1179896 #1179960 #1179963 #1180027 #1180029 #1180031 #1180052 #1180056 #1180086 #1180117 #1180258 #1180261 #1180506 #1180541 #1180559 #1180566 Cross-References: CVE-2020-0444 CVE-2020-0465 CVE-2020-0466 CVE-2020-11668 CVE-2020-27068 CVE-2020-27777 CVE-2020-27786 CVE-2020-27825 CVE-2020-27830 CVE-2020-28374 CVE-2020-29370 CVE-2020-29373 CVE-2020-29660 CVE-2020-29661 CVE-2020-36158 Affected Products: SUSE Linux Enterprise Workstation Extension 15-SP2 SUSE Linux Enterprise Module for Live Patching 15-SP2 SUSE Linux Enterprise Module for Legacy Software 15-SP2 SUSE Linux Enterprise Module for Development Tools 15-SP2 SUSE Linux Enterprise Module for Basesystem 15-SP2 SUSE Linux Enterprise High Availability 15-SP2 ______________________________________________________________________________ An update that solves 15 vulnerabilities and has 98 fixes is now available. Description: The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372). o CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559). o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc #1179960). o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031). o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086). o CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027). o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029). o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745). o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745). o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107). o CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434). o CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952). o CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656). o CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc# 1179435). o CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601). The following non-security bugs were fixed: o ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc# SLE-16610). o ACPI: PNP: compare the string length in the matching_id() (git-fixes). o ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes). o ALSA: core: memalloc: add page alignment for iram (git-fixes). o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes). o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes). o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes). o ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes). o ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes). o ALSA: hda/proc - print DP-MST connections (git-fixes). o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes). o ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes). o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes). o ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes). o ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes). o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes). o ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes). o ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes). o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes). o ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes). o ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes). o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes). o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes). o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes). o ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes). o ALSA: seq: remove useless function (git-fixes). o ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203). o ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203). o ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes). o ALSA: usb-audio: Add implicit_fb module option (bsc#1178203). o ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes). o ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203). o ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203). o ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes). o ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes). o ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203). o ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203). o ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc# 1178203). o ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc# 1178203). o ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203). o ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203). o ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc# 1178203). o ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203). o ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes). o ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc# 1178203). o ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc #1178203). o ALSA: usb-audio: Drop debug.h (bsc#1178203). o ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203). o ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203). o ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203). o ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes). o ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203). o ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203). o ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc# 1178203). o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes). o ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203). o ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc# 1178203). o ALSA: usb-audio: Improve some debug prints (bsc#1178203). o ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203). o ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc #1178203). o ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc# 1178203). o ALSA: usb-audio: Properly match with audio interface class (bsc#1178203). o ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203). o ALSA: usb-audio: Refactor endpoint management (bsc#1178203). o ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203). o ALSA: usb-audio: Replace slave/master terms (bsc#1178203). o ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203). o ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc# 1178203). o ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc# 1178203). o ALSA: usb-audio: Simplify hw_params rules (bsc#1178203). o ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203). o ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203). o ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203). o ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc# 1178203). o ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203). o ALSA: usb-audio: Support PCM sync_stop (bsc#1178203). o ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc# 1178203). o ALSA: usb-audio: Unify the code for the next packet size calculation (bsc# 1178203). o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes). o ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203). o ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203). o ALSA: usb-audio: Use managed buffer allocation (bsc#1178203). o ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc# 1178203). o ALSA: usb-audio: workaround for iface reset issue (bsc#1178203). o arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc# SLE-16610). o ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes). o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes). o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes). o ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes). o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes). o ASoC: meson: fix COMPILE_TEST error (git-fixes). o ASoC: pcm: DRAIN support reactivation (git-fixes). o ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes). o ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes). o ASoC: tegra20-spdif: remove "default m" (git-fixes). o ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes). o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes). o ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes). o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control() (git-fixes). o ath10k: Fix an error handling path (git-fixes). o ath10k: Release some resources in an error handling path (git-fixes). o ath6kl: fix enum-conversion warning (git-fixes). o batman-adv: Consider fragmentation for needed_headroom (git-fixes). o batman-adv: Do not always reallocate the fragmentation skb head (git-fixes). o batman-adv: Reserve needed_*room for fragments (git-fixes). o blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486). o block: return status code in blk_mq_end_request() (bsc#1171000, bsc# 1165933). o Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes). o Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes). o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes). o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes). o Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes). o bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes). o btrfs: add missing check for nocow and compression inode flags (bsc# 1178780). o btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099). o btrfs: delete duplicated words + other fixes in comments (bsc#1180566). o btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566). o btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc #1180566). o btrfs: fix readahead hang and use-after-free after removing a device (bsc# 1179963). o btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963). o btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634). o btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575). o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes). o can: c_can: c_can_power_up(): fix error handling (git-fixes). o can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes). o can: softing: softing_netdev_open(): fix error handling (git-fixes). o can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes). o cfg80211: initialize rekey_data (git-fixes). o cifs: add NULL check for ses->tcon_ipc (bsc#1178270). o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956). o cifs: do not share tcons with DFS (bsc#1178270). o cifs: document and cleanup dfs mount (bsc#1178270). o cifs: ensure correct super block for DFS reconnect (bsc#1178270). o cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270). o cifs: fix check of tcon dfs in smb1 (bsc#1178270). o cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270). o cifs: fix double free error on share and prefix (bsc#1178270). o cifs: fix leaked reference on requeued write (bsc#1178270). o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944). o cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270). o cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc# 1178270). o cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270). o cifs: handle hostnames that resolve to same ip in failover (bsc#1178270). o cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270). o cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc# 1178270). o cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc# 1178270). o cifs: reduce number of referral requests in DFS link lookups (bsc#1178270). o cifs: rename reconn_inval_dfs_target() (bsc#1178270). o cifs: set up next DFS target before generic_ip_connect() (bsc#1178270). o clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes). o clk: ingenic: Fix divider calculation with div tables (git-fixes). o clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes). o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes). o clk: renesas: r9a06g032: Drop __packed for portability (git-fixes). o clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes). o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes). o clk: tegra: Do not return 0 on failure (git-fixes). o clk: tegra: Fix duplicated SE clock entry (git-fixes). o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes). o clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes). o clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes). o clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes). o clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes). o compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203). o coredump: fix core_pattern parse error (git-fixes). o cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes). o cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes). o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes). o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes). o crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes). o crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes). o crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes). o crypto: inside-secure - Fix sizeof() mismatch (git-fixes). o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes). o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes). o crypto: sun4i-ss - add the A33 variant of SS (git-fixes). o crypto: talitos - Endianess in current_desc_hdr() (git-fixes). o crypto: talitos - Fix return type of current_desc_hdr() (git-fixes). o cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes). o dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes). o drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes). o drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc# 1152489) o drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: * context fixes o drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472) o drm/gma500: fix error check (bsc#1152472) Backporting changes: * context fixes o drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: * context fixes o drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: * context fixes * adapted I/O functions to old driver o drm/imx: tve remove extraneous type qualifier (bsc#1152489) o drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc# 1152472) o drm/mediatek: Add missing put_device() call in (bsc#1152472) o drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc# 1152472) Backporting changes: * context fixes * adapted to function layout o drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489) o drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: * context fixes o drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489) o drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: * context fixes o drm/radeon: Prefer lower feedback dividers (bsc#1152489) o drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489) o drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489) o drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: * context fixes o drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: * context fixes o drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: * changed filename from vkms_composer.c to vkms_crc.c * context fixes o drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: * context fixes o drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: * context fixes o drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489) o drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: * context fixes o drm: rcar-du: Put reference to VSP device (bsc#1152489) o EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763). o EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489). o EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc# 1152489). o epoll: Keep a reference on files added to the check list (bsc#1180031). o ethtool: fix error handling in ethtool_phys_id (git-fixes). o ext4: correctly report "not supported" for {usr,grp}jquota when ! CONFIG_QUOTA (bsc#1179672). o ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716). o ext4: fix leaking sysfs kobject after failed mount (bsc#1179670). o ext4: limit entries returned when counting fsmap records (bsc#1179671). o ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc# 1179673). o extcon: max77693: Fix modalias string (git-fixes). o fail_function: Remove a redundant mutex unlock (bsc#1149032). o fbcon: Remove the superfluous break (bsc#1152472) o firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610). o fix regression in "epoll: Keep a reference on files added to the check list" (bsc#1180031, git-fixes). o fs/minix: check return value of sb_getblk() (bsc#1179676). o fs/minix: do not allow getting deleted inodes (bsc#1179677). o fs/minix: fix block limit check for V1 filesystems (bsc#1179680). o fs/minix: reject too-large maximum file size (bsc#1179678). o fs/minix: remove expected error message in block_to_path() (bsc#1179681). o fs/minix: set s_maxbytes correctly (bsc#1179679). o fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682). o fs: Do not invalidate page buffers in block_write_full_page() (bsc# 1179711). o ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes). o geneve: pull IP header before ECN decapsulation (git-fixes). o genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc# 1065729). o genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc# 1156315). o gpio: mvebu: fix potential user-after-free on probe (git-fixes). o gpio: mvebu: update Armada XP per-CPU comment (git-fixes). o HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes). o HID: Add Logitech Dinovo Edge battery quirk (git-fixes). o HID: add support for Sega Saturn (git-fixes). o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes). o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes). o HID: i2c-hid: add Vero K147 to descriptor override (git-fixes). o HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes). o HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes). o HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes). o HMAT: Register memory-side cache after parsing (bsc#1178660). o HMAT: Skip publishing target info for nodes with no online memory (bsc# 1178660). o HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes). o i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes). o IB/isert: Fix unaligned immediate-data handling (bsc#1152489) o IB/mlx4: Add and improve logging (bsc#1152489) o IB/mlx4: Add support for MRA (bsc#1152489) o IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489) o IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489) o IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489) o IB/rdmavt: Fix sizeof mismatch (bsc#1152489) o IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489) o IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489) o ibmvnic: add some debugs (bsc#1179896 ltc#190255). o ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes). o ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc# 184239 git-fixes). o ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes). o ibmvnic: enhance resetting status check during module exit (bsc#1065729). o ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes). o ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes). o ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes). o ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc# 155423 git-fixes). o ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes). o iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes). o iio: buffer: Fix demux update (git-fixes). o iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes). o iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes). o iio:imu:bmi160: Fix too large a buffer (git-fixes). o iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes). o iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes). o iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes). o iio:pressure:mpl3115: Force alignment of buffer (git-fixes). o inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes). o Input: ads7846 - fix integer overflow on Rt calculation (git-fixes). o Input: ads7846 - fix race that causes missing releases (git-fixes). o Input: ads7846 - fix unaligned access on 7845 (git-fixes). o Input: cm109 - do not stomp on control URB (git-fixes). o Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes). o Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes). o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes). o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes). o Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes). o Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes). o Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes). o Input: omap4-keypad - fix runtime PM error handling (git-fixes). o Input: xpad - support Ardwiino Controllers (git-fixes). o iomap: Clear page error before beginning a write (bsc#1179683). o iomap: Mark read blocks uptodate in write_begin (bsc#1179684). o iomap: Set all uptodate bits for an Uptodate page (bsc#1179685). o iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652). o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes). o iwlwifi: mvm: hook up missing RX handlers (git-fixes). o iwlwifi: pcie: add one missing entry for AX210 (git-fixes). o iwlwifi: pcie: limit memory read spin time (git-fixes). o jbd2: fix up sparse warnings in checkpoint code (bsc#1179707). o kABI workaround for HD-audio generic parser (git-fixes). o kABI workaround for USB audio driver (bsc#1178203). o kABI: genirq: add back irq_create_mapping (bsc#1065729). o kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc #1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc# 1156395). o lan743x: fix for potential NULL pointer dereference with bare card (git-fixes). o libfs: fix error cast of negative value in simple_attr_write() (bsc# 1179709). o locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc# 1149032). o mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes). o mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes). o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc# 1163727). o md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727). o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727). o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727). o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727). o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727). o md/cluster: block reshape with remote resync job (bsc#1163727). o md/cluster: fix deadlock when node is doing resync job (bsc#1163727). o media: gspca: Fix memory leak in probe (git-fixes). o media: imx214: Fix stop streaming (git-fixes). o media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes). o media: ipu3-cio2: Remove traces of returned buffers (git-fixes). o media: ipu3-cio2: Return actual subdev format (git-fixes). o media: ipu3-cio2: Serialise access to pad format (git-fixes). o media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes). o media: max2175: fix max2175_set_csm_mode() error code (git-fixes). o media: msi2500: assign SPI bus number dynamically (git-fixes). o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm () (git-fixes). o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm () (git-fixes). o media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes). o media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes). o media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes). o media: solo6x10: fix missing snd_card_free in error handling case (git-fixes). o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes). o media: tm6000: Fix sizeof() mismatches (git-fixes). o media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc# 1180117). o memstick: fix a double-free bug in memstick_check (git-fixes). o memstick: r592: Fix error return in r592_probe() (git-fixes). o mfd: rt5033: Fix errorneous defines (git-fixes). o mm,memory_failure: always pin the page in madvise_inject_error (bsc# 1180258). o mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710). o mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610). o mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679). o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204). o mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056). o mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes). o mmc: pxamci: Fix error return code in pxamci_probe (git-fixes). o mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes). o mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes). o mtd: rawnand: meson: Fix a resource leak in init (git-fixes). o mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes). o mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes). o mtd: spinand: Fix OOB read (git-fixes). o mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes). o net/x25: prevent a couple of overflows (bsc#1178590). o net: sctp: Rename fallthrough label to unhandled (bsc#1178203). o nfc: s3fwrn5: Release the nfc firmware (git-fixes). o nvme-fabrics: allow to queue requests for live queues (git-fixes). o nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc# 1179519). o nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326). o nvme-fc: cancel async events before freeing event struct (git-fixes). o nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc# 1177326). o nvme-fc: fix error loop in create_hw_io_queues (git-fixes). o nvme-fc: fix io timeout to abort I/O (bsc#1177326). o nvme-fc: remove err_work work item (bsc#1177326). o nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326). o nvme-fc: shorten reconnect delay if possible for FC (git-fixes). o nvme-fc: track error_recovery while connecting (bsc#1177326). o nvme-fc: wait for queues to freeze before calling (git-fixes). o nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes). o nvme-multipath: fix deadlock due to head->lock (git-fixes). o nvme-pci: properly print controller address (git-fixes). o nvme-rdma: avoid race between time out and tear down (bsc#1179519). o nvme-rdma: avoid repeated request completion (bsc#1179519). o nvme-rdma: cancel async events before freeing event struct (git-fixes). o nvme-rdma: fix controller reset hang during traffic (bsc#1179519). o nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc# 1179519). o nvme-rdma: fix timeout handler (bsc#1179519). o nvme-rdma: handle unexpected nvme completion data length (bsc#1178612). o nvme-rdma: serialize controller teardown sequences (bsc#1179519). o nvme-tcp: avoid race between time out and tear down (bsc#1179519). o nvme-tcp: avoid repeated request completion (bsc#1179519). o nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519). o nvme-tcp: break from io_work loop if recv failed (bsc#1179519). o nvme-tcp: cancel async events before freeing event struct (git-fixes). o nvme-tcp: do not poll a non-live queue (bsc#1179519). o nvme-tcp: fix controller reset hang during traffic (bsc#1179519). o nvme-tcp: fix possible crash in recv error flow (bsc#1179519). o nvme-tcp: fix possible leakage during error flow (git-fixes). o nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc# 1179519). o nvme-tcp: fix timeout handler (bsc#1179519). o nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519). o nvme-tcp: leverage request plugging (bsc#1179519). o nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519). o nvme-tcp: optimize network stack with setting msg flags (bsc#1179519). o nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes). o nvme-tcp: serialize controller teardown sequences (bsc#1179519). o nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc# 1179519). o nvme-tcp: try to send request in queue_rq context (bsc#1179519). o nvme-tcp: use bh_lock in data_ready (bsc#1179519). o nvme: do not protect ns mutation with ns->head->lock (git-fixes). o nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519). o nvme: introduce nvme_sync_io_queues (bsc#1179519). o nvme: Revert: Fix controller creation races with teardown (git-fixes). o nvmet-fc: fix missing check for no hostport struct (bsc#1176942). o nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892). o ocfs2: fix unbalanced locking (bsc#1180506). o orinoco: Move context allocation after processing the skb (git-fixes). o PCI: brcmstb: Initialize "tmp" before use (git-fixes). o PCI: Fix overflow in command-line resource alignment requests (git-fixes). o PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes). o PCI: iproc: Fix out-of-bound array accesses (git-fixes). o pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes). o pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes). o pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes). o pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes). o pinctrl: merrifield: Set default bias in case no particular value given (git-fixes). o platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes). o platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes). o platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes). o platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes). o platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes). o platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes). o platform/x86: mlx-platform: remove an unused variable (git-fixes). o platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes). o platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes). o platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes). o platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes). o platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes). o power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes). o power: supply: bq24190_charger: fix reference leak (git-fixes). o powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc #1065729). o powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes). o powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc# 1179888 ltc#190253). o powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes). o powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253). o powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395). o powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395). o powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc# 189002). o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc# 184630). o powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc# 1179578 ltc#189313). o powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes). o powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729). o powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes). o powerpc/xmon: Change printk() to pr_cont() (bsc#1065729). o powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395). o powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc# 1065729). o pwm: lp3943: Dynamically allocate PWM chip base (git-fixes). o pwm: zx: Add missing cleanup in error path (git-fixes). o qede: Notify qedr when mtu has changed (bsc#1152489) o qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes). o quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714). o RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc# 1152489) o RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489) o RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489) o RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc# 1152489) o RDMA/core: Fix reported speed and width (bsc#1152489) o RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc# 1152489) o RDMA/core: Free DIM memory in error unwind (bsc#1152489) o RDMA/core: Stop DIM before destroying CQ (bsc#1152489) o RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489) o RDMA/counter: Only bind user QPs in auto mode (bsc#1152489) o RDMA/hns: Add check for the validity of sl configuration (bsc#1152489) o RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489) o RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489) o RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489) o RDMA/hns: Set the unsupported wr opcode (bsc#1152489) o RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489) o RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489) o RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489) o RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489) o RDMA/qedr: Endianness warnings cleanup (bsc#1152489) o RDMA/qedr: Fix doorbell setting (bsc#1152489) o RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489) o RDMA/qedr: Fix iWARP active mtu display (bsc#1152489) o RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489) o RDMA/qedr: Fix qp structure memory leak (bsc#1152489) o RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489) o RDMA/qedr: Fix use of uninitialized field (bsc#1152489) o RDMA/qedr: SRQ's bug fixes (bsc#1152489) o RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489) o RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489) o RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489) o RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc# 1152489) o RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489) o RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489) o RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489) o RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489) o RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489) o RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489) o RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489) o RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489) o RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489) o Re-import the upstream uvcvideo fix; one more fix will be added later (bsc# 1180117) o regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes). o regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes). o regulator: mcp16502: add linear_min_sel (git-fixes). o reiserfs: Fix oops during mount (bsc#1179715). o reiserfs: Initialize inode keys properly (bsc#1179713). o remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes). o remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes). o remoteproc: qcom: fix reference leak in adsp_start (git-fixes). o rsi: fix error return code in rsi_reset_card() (git-fixes). o rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes). o rtc: hym8563: enable wakeup when applicable (git-fixes). o rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes). o s390/cpuinfo: show processor physical address (git-fixes). o s390/pci: fix CPU address in MSI for directed IRQ (git-fixes). o s390/qeth: delay draining the TX buffers (git-fixes). o s390/qeth: fix af_iucv notification race (git-fixes). o s390/qeth: fix tear down of async TX buffers (git-fixes). o s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC# 190151). o s390: add 3f program exception handler (git-fixes). o samples/bpf: Remove unused test_ipip.sh (bsc#1155518). o samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518). o sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes) o sched/fair: Fix race between runtime distribution and (git-fixes) o sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes) o sched/fair: Refill bandwidth before scaling (git-fixes) o sched: correct SD_flags returned by tl->sd_flags() (git-fixes) o scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049). o scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc# 1171000). o scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079). o scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079). o scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079). o scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079). o scsi: fnic: Validate io_req before others (bsc#1175079). o scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix spelling mistake "Cant" -> "Can't" (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc# 1177500). o scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc# 1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc #1176942 bsc#1177500). o scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc# 1176396 bsc#1176942 bsc#1177500). o scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc# 1176942 bsc#1177500). o scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Get device objects using sas_address & portID (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc #1177733). o scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc# SLE-16914, bsc#1177733). o scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733). o scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc #1177733). o scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc #1177733). o scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc #1177733). o scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc# 1177733). o scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc# 1177733). o scsi: qla2xxx: Change post del message from debug level to log level (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc# 1171688 bsc#1172733). o scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc# 1172733). o scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733). o scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733). o scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500). o scsi: storvsc: Fix error return in storvsc_probe() (git-fixes). o scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc# 1172733). o scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc# 1165933, bsc#1171000). o scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc #1165933). o selftest/bpf: Add missed ip6ip6 test back (bsc#1155518). o selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518). o selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518). o selftests/bpf: Print reason when a tester could not run a program (bsc# 1155518). o serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes). o serial_core: Check for port state when tty is in error state (git-fixes). o slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes). o soc/tegra: fuse: Fix index bug in get_process_id (git-fixes). o soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes). o soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes). o soc: mediatek: Check if power domains can be powered on at boot time (git-fixes). o soc: qcom: geni: More properly switch to DMA mode (git-fixes). o soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes). o soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes). o soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes). o soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes). o speakup: fix uninitialized flush_lock (git-fixes). o spi: atmel-quadspi: Disable clock in probe error path (git-fixes). o spi: atmel-quadspi: Fix AHB memory accesses (git-fixes). o spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes). o spi: davinci: Fix use-after-free on unbind (git-fixes). o spi: fix resource leak for drivers without .remove callback (git-fixes). o spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes). o spi: mt7621: Disable clock in probe error path (git-fixes). o spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes). o spi: mxs: fix reference leak in mxs_spi_probe (git-fixes). o spi: pic32: Do not leak DMA channels in probe error path (git-fixes). o spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes). o spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes). o spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes). o spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes). o spi: sprd: fix reference leak in sprd_spi_remove (git-fixes). o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes). o spi: stm32: fix reference leak in stm32_spi_resume (git-fixes). o spi: synquacer: Disable clock in probe error path (git-fixes). o spi: tegra114: fix reference leak in tegra spi ops (git-fixes). o spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes). o spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes). o staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes). o staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe () (git-fixes). o thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes). o tty: Fix ->pgrp locking in tiocspgrp() (git-fixes). o tty: Fix ->session locking (bsc#1179745). o ubifs: dent: Fix some potential memory leaks while iterating entries (bsc# 1179703). o ubifs: Do not parse authentication mount options in remount process (bsc# 1179688). o ubifs: Fix a memleak after dumping authentication mount options (bsc# 1179687). o ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc# 1179675). o ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704). o ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689). o ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc# 1179690). o udf: Fix memory leak when mounting (bsc#1179712). o usb/max3421: fix return error code in max3421_probe() (git-fixes). o usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes). o usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes). o usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes). o usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes). o usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes). o usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes). o usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes). o usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes). o usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes). o usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes). o usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes). o usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes). o usb: serial: ch341: add new Product ID for CH341A (git-fixes). o usb: serial: ch341: sort device-id entries (git-fixes). o usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes). o usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes). o usb: serial: keyspan_pda: fix stalled writes (git-fixes). o usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes). o usb: serial: keyspan_pda: fix write deadlock (git-fixes). o usb: serial: keyspan_pda: fix write unthrottling (git-fixes). o usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes). o usb: serial: kl5kusb105: fix memleak on open (git-fixes). o usb: serial: mos7720: fix parallel-port state restore (git-fixes). o usb: serial: option: add Fibocom NL668 variants (git-fixes). o usb: serial: option: add interface-number sanity check to flag handling (git-fixes). o usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes). o usb: serial: option: fix Quectel BG96 matching (git-fixes). o usb: UAS: introduce a quirk to set no_write_same (git-fixes). o usbnet: ipheth: fix connectivity with iOS 14 (git-fixes). o video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472) o video: fbdev: sis: fix null ptr dereference (bsc#1152472) o watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes). o watchdog: coh901327: add COMMON_CLK dependency (git-fixes). o watchdog: Fix potential dereferencing of null pointer (git-fixes). o watchdog: qcom: Avoid context switch in restart handler (git-fixes). o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes). o watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes). o watchdog: sprd: check busy bit before new loading rather than after that (git-fixes). o watchdog: sprd: remove watchdog disable from resume fail path (git-fixes). o wimax: fix duplicate initializer warning (git-fixes). o x86/apic/vector: Fix ordering in vector assignment (bsc#1156315). o x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489). o x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489). o x86/ima: use correct identifier for SetupMode variable (bsc#1152489). o x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489). o x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489). o x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489). o x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489). o x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc #1152489). o x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489). o x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc# 1152489). o x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489). o x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489). o x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc #1152489). o x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489). o x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489). o xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-WE-15-SP2-2021-117=1 o SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2021-117=1 o SUSE Linux Enterprise Module for Legacy Software 15-SP2: zypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2021-117=1 o SUSE Linux Enterprise Module for Development Tools 15-SP2: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-117=1 o SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-117=1 o SUSE Linux Enterprise High Availability 15-SP2: zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2021-117=1 Package List: o SUSE Linux Enterprise Workstation Extension 15-SP2 (x86_64): kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 kernel-default-extra-5.3.18-24.46.1 kernel-default-extra-debuginfo-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 kernel-default-livepatch-5.3.18-24.46.1 kernel-default-livepatch-devel-5.3.18-24.46.1 kernel-livepatch-5_3_18-24_46-default-1-5.3.1 kernel-livepatch-5_3_18-24_46-default-debuginfo-1-5.3.1 kernel-livepatch-SLE15-SP2_Update_9-debugsource-1-5.3.1 o SUSE Linux Enterprise Module for Legacy Software 15-SP2 (aarch64 ppc64le s390x x86_64): kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 reiserfs-kmp-default-5.3.18-24.46.1 reiserfs-kmp-default-debuginfo-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le s390x x86_64): kernel-obs-build-5.3.18-24.46.1 kernel-obs-build-debugsource-5.3.18-24.46.1 kernel-syms-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 x86_64): kernel-preempt-debuginfo-5.3.18-24.46.1 kernel-preempt-debugsource-5.3.18-24.46.1 kernel-preempt-devel-5.3.18-24.46.1 kernel-preempt-devel-debuginfo-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch): kernel-docs-5.3.18-24.46.1 kernel-source-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): kernel-default-5.3.18-24.46.1 kernel-default-base-5.3.18-24.46.1.9.19.1 kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 kernel-default-devel-5.3.18-24.46.1 kernel-default-devel-debuginfo-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 x86_64): kernel-preempt-5.3.18-24.46.1 kernel-preempt-debuginfo-5.3.18-24.46.1 kernel-preempt-debugsource-5.3.18-24.46.1 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch): kernel-devel-5.3.18-24.46.1 kernel-macros-5.3.18-24.46.1 o SUSE Linux Enterprise High Availability 15-SP2 (aarch64 ppc64le s390x x86_64): cluster-md-kmp-default-5.3.18-24.46.1 cluster-md-kmp-default-debuginfo-5.3.18-24.46.1 dlm-kmp-default-5.3.18-24.46.1 dlm-kmp-default-debuginfo-5.3.18-24.46.1 gfs2-kmp-default-5.3.18-24.46.1 gfs2-kmp-default-debuginfo-5.3.18-24.46.1 kernel-default-debuginfo-5.3.18-24.46.1 kernel-default-debugsource-5.3.18-24.46.1 ocfs2-kmp-default-5.3.18-24.46.1 ocfs2-kmp-default-debuginfo-5.3.18-24.46.1 References: o https://www.suse.com/security/cve/CVE-2020-0444.html o https://www.suse.com/security/cve/CVE-2020-0465.html o https://www.suse.com/security/cve/CVE-2020-0466.html o https://www.suse.com/security/cve/CVE-2020-11668.html o https://www.suse.com/security/cve/CVE-2020-27068.html o https://www.suse.com/security/cve/CVE-2020-27777.html o https://www.suse.com/security/cve/CVE-2020-27786.html o https://www.suse.com/security/cve/CVE-2020-27825.html o https://www.suse.com/security/cve/CVE-2020-27830.html o https://www.suse.com/security/cve/CVE-2020-28374.html o https://www.suse.com/security/cve/CVE-2020-29370.html o https://www.suse.com/security/cve/CVE-2020-29373.html o https://www.suse.com/security/cve/CVE-2020-29660.html o https://www.suse.com/security/cve/CVE-2020-29661.html o https://www.suse.com/security/cve/CVE-2020-36158.html o https://bugzilla.suse.com/1040855 o https://bugzilla.suse.com/1044120 o https://bugzilla.suse.com/1044767 o https://bugzilla.suse.com/1055117 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1094840 o https://bugzilla.suse.com/1109695 o https://bugzilla.suse.com/1115431 o https://bugzilla.suse.com/1138374 o https://bugzilla.suse.com/1139944 o https://bugzilla.suse.com/1149032 o https://bugzilla.suse.com/1152457 o https://bugzilla.suse.com/1152472 o https://bugzilla.suse.com/1152489 o https://bugzilla.suse.com/1155518 o https://bugzilla.suse.com/1156315 o https://bugzilla.suse.com/1156395 o https://bugzilla.suse.com/1158775 o https://bugzilla.suse.com/1161099 o https://bugzilla.suse.com/1163727 o https://bugzilla.suse.com/1165933 o https://bugzilla.suse.com/1167657 o https://bugzilla.suse.com/1168952 o https://bugzilla.suse.com/1171000 o https://bugzilla.suse.com/1171078 o https://bugzilla.suse.com/1171688 o https://bugzilla.suse.com/1172145 o https://bugzilla.suse.com/1172733 o https://bugzilla.suse.com/1174486 o https://bugzilla.suse.com/1175079 o https://bugzilla.suse.com/1175480 o https://bugzilla.suse.com/1175995 o https://bugzilla.suse.com/1176396 o https://bugzilla.suse.com/1176942 o https://bugzilla.suse.com/1176956 o https://bugzilla.suse.com/1177326 o https://bugzilla.suse.com/1177500 o https://bugzilla.suse.com/1177666 o https://bugzilla.suse.com/1177679 o https://bugzilla.suse.com/1177733 o https://bugzilla.suse.com/1178049 o https://bugzilla.suse.com/1178203 o https://bugzilla.suse.com/1178270 o https://bugzilla.suse.com/1178372 o https://bugzilla.suse.com/1178590 o https://bugzilla.suse.com/1178612 o https://bugzilla.suse.com/1178634 o https://bugzilla.suse.com/1178660 o https://bugzilla.suse.com/1178756 o https://bugzilla.suse.com/1178780 o https://bugzilla.suse.com/1179107 o https://bugzilla.suse.com/1179204 o https://bugzilla.suse.com/1179419 o https://bugzilla.suse.com/1179434 o https://bugzilla.suse.com/1179435 o https://bugzilla.suse.com/1179519 o https://bugzilla.suse.com/1179575 o https://bugzilla.suse.com/1179578 o https://bugzilla.suse.com/1179601 o https://bugzilla.suse.com/1179604 o https://bugzilla.suse.com/1179639 o https://bugzilla.suse.com/1179652 o https://bugzilla.suse.com/1179656 o https://bugzilla.suse.com/1179670 o https://bugzilla.suse.com/1179671 o https://bugzilla.suse.com/1179672 o https://bugzilla.suse.com/1179673 o https://bugzilla.suse.com/1179675 o https://bugzilla.suse.com/1179676 o https://bugzilla.suse.com/1179677 o https://bugzilla.suse.com/1179678 o https://bugzilla.suse.com/1179679 o https://bugzilla.suse.com/1179680 o https://bugzilla.suse.com/1179681 o https://bugzilla.suse.com/1179682 o https://bugzilla.suse.com/1179683 o https://bugzilla.suse.com/1179684 o https://bugzilla.suse.com/1179685 o https://bugzilla.suse.com/1179687 o https://bugzilla.suse.com/1179688 o https://bugzilla.suse.com/1179689 o https://bugzilla.suse.com/1179690 o https://bugzilla.suse.com/1179703 o https://bugzilla.suse.com/1179704 o https://bugzilla.suse.com/1179707 o https://bugzilla.suse.com/1179709 o https://bugzilla.suse.com/1179710 o https://bugzilla.suse.com/1179711 o https://bugzilla.suse.com/1179712 o https://bugzilla.suse.com/1179713 o https://bugzilla.suse.com/1179714 o https://bugzilla.suse.com/1179715 o https://bugzilla.suse.com/1179716 o https://bugzilla.suse.com/1179745 o https://bugzilla.suse.com/1179763 o https://bugzilla.suse.com/1179888 o https://bugzilla.suse.com/1179892 o https://bugzilla.suse.com/1179896 o https://bugzilla.suse.com/1179960 o https://bugzilla.suse.com/1179963 o https://bugzilla.suse.com/1180027 o https://bugzilla.suse.com/1180029 o https://bugzilla.suse.com/1180031 o https://bugzilla.suse.com/1180052 o https://bugzilla.suse.com/1180056 o https://bugzilla.suse.com/1180086 o https://bugzilla.suse.com/1180117 o https://bugzilla.suse.com/1180258 o https://bugzilla.suse.com/1180261 o https://bugzilla.suse.com/1180506 o https://bugzilla.suse.com/1180541 o https://bugzilla.suse.com/1180559 o https://bugzilla.suse.com/1180566 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0118-1 Rating: important References: #1040855 #1044120 #1044767 #1050242 #1050536 #1050545 #1055117 #1056653 #1056657 #1056787 #1064802 #1065729 #1066129 #1094840 #1103990 #1103992 #1104389 #1104393 #1109695 #1109837 #1110096 #1112178 #1112374 #1115431 #1118657 #1129770 #1136460 #1136461 #1138374 #1139944 #1144912 #1152457 #1163727 #1164780 #1171078 #1172145 #1172538 #1172694 #1174784 #1174852 #1176558 #1176559 #1176956 #1178270 #1178372 #1178401 #1178590 #1178634 #1178762 #1179014 #1179015 #1179045 #1179082 #1179107 #1179142 #1179204 #1179419 #1179444 #1179520 #1179578 #1179601 #1179663 #1179666 #1179670 #1179671 #1179672 #1179673 #1179711 #1179713 #1179714 #1179715 #1179716 #1179722 #1179723 #1179724 #1179745 #1179810 #1179888 #1179895 #1179896 #1179960 #1179963 #1180027 #1180029 #1180031 #1180052 #1180086 #1180117 #1180258 #1180506 #1180559 Cross-References: CVE-2018-20669 CVE-2019-20934 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466 CVE-2020-27068 CVE-2020-27777 CVE-2020-27786 CVE-2020-27825 CVE-2020-28374 CVE-2020-29660 CVE-2020-29661 CVE-2020-36158 CVE-2020-4788 Affected Products: SUSE Linux Enterprise Workstation Extension 15-SP1 SUSE Linux Enterprise Module for Live Patching 15-SP1 SUSE Linux Enterprise Module for Legacy Software 15-SP1 SUSE Linux Enterprise Module for Development Tools 15-SP1 SUSE Linux Enterprise Module for Basesystem 15-SP1 SUSE Linux Enterprise High Availability 15-SP1 ______________________________________________________________________________ An update that solves 14 vulnerabilities and has 77 fixes is now available. Description: The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372). o CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559). o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc #1179960). o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031). o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086). o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029). o CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027). o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745). o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745). o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107). o CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc# 1179663). o CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601). The following non-security bugs were fixed: o ACPI: PNP: compare the string length in the matching_id() (git-fixes). o ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes). o ACPICA: Do not increment operation_region reference counts for field units (git-fixes). o ALSA: ca0106: fix error code handling (git-fixes). o ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes). o ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes). o ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes). o ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes). o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes). o ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes). o ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes). o ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes). o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes). o ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes). o ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes). o ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes). o ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes). o ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes). o ALSA: hda: Fix potential race in unsol event handler (git-fixes). o ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes). o ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes). o ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes). o ALSA: line6: Perform sanity check for each URB creation (git-fixes). o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes). o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes). o ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes). o ALSA: timer: Limit max amount of slave instances (git-fixes). o ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes). o ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes). o ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes). o ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes). o ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes). o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes). o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes). o ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes). o ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes). o ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes). o ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes). o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes). o ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes). o ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes). o ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes). o ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes). o ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes). o ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes). o ASoC: pcm3168a: The codec does not support S32_LE (git-fixes). o ASoC: pcm: DRAIN support reactivation (git-fixes). o ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes). o ASoC: sti: fix possible sleep-in-atomic (git-fixes). o ASoC: wm8904: fix regcache handling (git-fixes). o ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes). o ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes). o ASoC: wm_adsp: remove "ctl" from list on error in wm_adsp_create_control() (git-fixes). o ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes). o ath10k: Fix an error handling path (git-fixes). o ath10k: fix backtrace on coredump (git-fixes). o ath10k: fix get invalid tx rate for Mesh metric (git-fixes). o ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes). o ath10k: Release some resources in an error handling path (git-fixes). o ath10k: Remove msdu from idr when management pkt send fails (git-fixes). o ath6kl: fix enum-conversion warning (git-fixes). o ath9k_htc: Discard undersized packets (git-fixes). o ath9k_htc: Modify byte order for an error message (git-fixes). o ath9k_htc: Silence undersized packet warnings (git-fixes). o ath9k_htc: Use appropriate rs_datalen type (git-fixes). o Avoid a GCC warning about "/*" within a comment. o backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes). o Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes). o Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes). o Bluetooth: Fix advertising duplicated flags (git-fixes). o Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes). o Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes). o bnxt_en: Fix race when modifying pause settings (bsc#1050242 ). o bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc# 1050242). o btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694). o btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963). o btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634). o btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784). o bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes). o can: mcp251x: add error check when wq alloc failed (git-fixes). o can: softing: softing_netdev_open(): fix error handling (git-fixes). o cfg80211: initialize rekey_data (git-fixes). o cfg80211: regulatory: Fix inconsistent format argument (git-fixes). o cifs: add NULL check for ses->tcon_ipc (bsc#1178270). o cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956). o cifs: fix check of tcon dfs in smb1 (bsc#1178270). o cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944). o cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes). o cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes). o clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes). o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes). o clk: qcom: Allow constant ratio freq tables for rcg (git-fixes). o clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes). o clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes). o clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes). o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes). o clk: tegra: Fix duplicated SE clock entry (git-fixes). o clk: tegra: Fix Tegra PMC clock out parents (git-fixes). o clk: ti: composite: fix memory leak (git-fixes). o clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes). o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes). o clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes). o coredump: fix core_pattern parse error (git-fixes). o cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes). o cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes). o cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes). o cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes). o crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes). o crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes). o crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes). o crypto: talitos - Fix return type