Operating System:

[SUSE]

Published:

23 December 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4772
                   Security update for the Linux Kernel
                             23 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           linux kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Root Compromise          -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-19543 CVE-2019-19537 CVE-2019-19536
                   CVE-2019-19535 CVE-2019-19534 CVE-2019-19533
                   CVE-2019-19532 CVE-2019-19531 CVE-2019-19530
                   CVE-2019-19529 CVE-2019-19528 CVE-2019-19527
                   CVE-2019-19525 CVE-2019-19524 CVE-2019-19523
                   CVE-2019-19338 CVE-2019-19332 CVE-2019-19227
                   CVE-2019-19083 CVE-2019-19082 CVE-2019-19081
                   CVE-2019-19080 CVE-2019-19078 CVE-2019-19077
                   CVE-2019-19075 CVE-2019-19074 CVE-2019-19073
                   CVE-2019-19068 CVE-2019-19067 CVE-2019-19065
                   CVE-2019-19063 CVE-2019-19062 CVE-2019-19060
                   CVE-2019-19058 CVE-2019-19057 CVE-2019-19056
                   CVE-2019-19052 CVE-2019-19049 CVE-2019-19046
                   CVE-2019-18809 CVE-2019-18805 CVE-2019-18683
                   CVE-2019-18680 CVE-2019-18660 CVE-2019-17055
                   CVE-2019-16231 CVE-2019-15916 CVE-2019-15213
                   CVE-2019-14901 CVE-2019-14895 CVE-2019-0154

Reference:         ESB-2019.4676
                   ESB-2019.4537
                   ESB-2019.4282
                   ESB-2019.4274
                   ESB-2019.4272

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2019/suse-su-20193371-1.html
   https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html
   https://www.suse.com/support/update/announcement/2019/suse-su-20193379-1.html

Comment: This bulletin contains three (3) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2019:3371-1
Rating:            important
References:        #1048942 #1051510 #1078248 #1082635 #1089644 #1091041
                   #1108043 #1113722 #1114279 #1117169 #1131107 #1138039
                   #1140948 #1143706 #1144333 #1149448 #1150466 #1151548
                   #1151900 #1152782 #1153628 #1153681 #1153811 #1154043
                   #1154058 #1154124 #1154355 #1154526 #1154956 #1155021
                   #1155689 #1155692 #1155836 #1155897 #1155921 #1155982
                   #1156187 #1156258 #1156429 #1156466 #1156471 #1156494
                   #1156609 #1156700 #1156729 #1156882 #1157038 #1157042
                   #1157070 #1157143 #1157145 #1157158 #1157162 #1157171
                   #1157173 #1157178 #1157180 #1157182 #1157183 #1157184
                   #1157191 #1157193 #1157197 #1157298 #1157307 #1157324
                   #1157333 #1157424 #1157463 #1157499 #1157678 #1157698
                   #1157778 #1157908 #1158049 #1158063 #1158064 #1158065
                   #1158066 #1158067 #1158068 #1158082
Cross-References:  CVE-2019-14895 CVE-2019-15916 CVE-2019-16231 CVE-2019-17055
                   CVE-2019-18660 CVE-2019-18683 CVE-2019-18805 CVE-2019-18809
                   CVE-2019-19049 CVE-2019-19052 CVE-2019-19056 CVE-2019-19057
                   CVE-2019-19058 CVE-2019-19060 CVE-2019-19062 CVE-2019-19063
                   CVE-2019-19065 CVE-2019-19067 CVE-2019-19068 CVE-2019-19073
                   CVE-2019-19074 CVE-2019-19075 CVE-2019-19077 CVE-2019-19227
Affected Products:
                   SUSE Linux Enterprise Workstation Extension 12-SP4
                   SUSE Linux Enterprise Software Development Kit 12-SP4
                   SUSE Linux Enterprise Server 12-SP4
                   SUSE Linux Enterprise Live Patching 12-SP4
                   SUSE Linux Enterprise High Availability 12-SP4
                   SUSE Linux Enterprise Desktop 12-SP4
______________________________________________________________________________

An update that solves 24 vulnerabilities and has 58 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security
and bugfixes.

The following security bugs were fixed:

  o CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux
    kernel in Marvell WiFi chip driver. The flaw could occur when the station
    attempts a connection negotiation during the handling of the remote devices
    country settings. This could have allowed the remote device to cause a
    denial of service (system crash) or possibly execute arbitrary code (bnc#
    1157158).
  o CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure
    because the Spectre-RSB mitigation is not in place for all applicable CPUs.
    This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/
    security.c (bnc#1157038).
  o CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in
    the Linux kernel. It is exploitable for privilege escalation on some Linux
    distributions where local users have /dev/video0 access, but only if the
    driver happens to be loaded. There are multiple race conditions during
    streaming stopping in this driver (part of the V4L2 subsystem). These
    issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap
    (), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the
    corresponding kthreads. At least one of these race conditions leads to a
    use-after-free (bnc#1155897).
  o CVE-2019-18809: A memory leak in the af9005_identify_state() function in
    drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to
    cause a denial of service (memory consumption) (bnc#1156258).
  o CVE-2019-19062: A memory leak in the crypto_report() function in crypto/
    crypto_user_base.c in the Linux kernel allowed attackers to cause a denial
    of service (memory consumption) by triggering crypto_report_alg() failures
    (bnc#1157333).
  o CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring()
    function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel
    allowed attackers to cause a denial of service (memory consumption) by
    triggering mwifiex_map_pci_memory() failures (bnc#1157197).
  o CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf()
    function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel
    allowed attackers to cause a denial of service (memory consumption) by
    triggering mwifiex_map_pci_memory() failures (bnc#1157197).
  o CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in
    drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel
    allowed attackers to cause a denial of service (memory consumption) by
    triggering usb_submit_urb() failures (bnc#1157307).
  o CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers
    /net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers
    to cause a denial of service (memory consumption) (bnc#1157298).
  o CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a
    potential NULL pointer dereference because register_snap_client may return
    NULL. This will lead to denial of service in net/appletalk/aarp.c and net/
    appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).
  o CVE-2019-19065: A memory leak in the sdma_init() function in drivers/
    infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a
    denial of service (memory consumption) by triggering rhashtable_init()
    failures (bnc#1157191).
  o CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in
    drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed
    attackers to cause a denial of service (memory consumption) by triggering
    copy to udata failures (bnc#1157171).
  o CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/
    can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of
    service (memory consumption) by triggering usb_submit_urb() failures (bnc#
    1157324).
  o CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/
    gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to
    cause a denial of service (memory consumption) by triggering
    mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).
  o CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in
    drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to
    cause a denial of service (memory consumption) (bnc#1157178).
  o CVE-2019-19049: A memory leak in the unittest_data_add() function in
    drivers/of/unittest.c in the Linux kernel allowed attackers to cause a
    denial of service (memory consumption) by triggering of_fdt_unflatten_tree
    () failures (bsc#1157173).
  o CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net
    /ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a
    denial of service (memory consumption) by triggering
    ca8210_get_platform_data() failures (bnc#1157162).
  o CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/
    net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers
    to cause a denial of service (memory consumption) by triggering alloc_page
    () failures (bnc#1157145).
  o CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/
    net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause
    a denial of service (memory consumption) (bnc#1157143).
  o CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in
    the Linux kernel allowed attackers to cause a denial of service (memory
    consumption) by triggering wait_for_completion_timeout() failures. This
    affects the htc_config_pipe_credits() function, the htc_setup_complete()
    function, and the htc_connect_service() function (bnc#1157070).
  o CVE-2019-15916: An issue was discovered in the Linux kernel There was a
    memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which
    will cause denial of service (bnc#1149448).
  o CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did
    not check the alloc_workqueue return value, leading to a NULL pointer
    dereference (bnc#1150466).
  o CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in
    the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow
    in tcp_ack_update_rtt() when userspace writes a very large integer to /proc
    /sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly
    unspecified other impact (bnc#1156187).
  o CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the
    AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW,
    which means that unprivileged users can create a raw socket (bnc#1152782).

The following non-security bugs were fixed:

  o ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask
    (bsc#1051510).
  o ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).
  o ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).
  o ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).
  o ALSA: 6fire: Drop the dead code (git-fixes).
  o ALSA: bebob: fix to detect configured source of sampling clock for
    Focusrite Saffire Pro i/o series (git-fixes).
  o ALSA: cs4236: fix error return comparison of an unsigned integer
    (git-fixes).
  o ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).
  o ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).
  o ALSA: hda - Fix pending unsol events at shutdown (git-fixes).
  o ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).
  o ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).
  o ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).
  o ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).
  o ALSA: hda: Add Cometlake-S PCI ID (git-fixes).
  o ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).
  o ALSA: intel8x0m: Register irq handler after register initializations (bsc#
    1051510).
  o ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).
  o ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).
  o ALSA: seq: Do error checks at creating system ports (bsc#1051510).
  o ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).
  o ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling
    (git-fixes).
  o ALSA: usb-audio: Fix missing error check at mixer resolution test
    (git-fixes).
  o ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).
  o ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).
  o ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).
  o ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).
  o ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).
  o ASoC: kirkwood: fix external clock probe defer (git-fixes).
  o ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).
  o ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).
  o ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).
  o ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).
  o ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).
  o Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).
  o Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).
  o Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#
    1051510).
  o Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).
  o Bluetooth: delete a stray unlock (bsc#1051510).
  o Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).
  o Btrfs: fix log context list corruption after rename exchange operation (bsc
    #1156494).
  o CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).
  o CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#
    1154355).
  o CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#
    1154355).
  o CIFS: Fix use after free of file info structures (bsc#1144333, bsc#
    1154355).
  o CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#
    1154355).
  o CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#
    1154355).
  o CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#
    1154355).
  o CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).
  o CIFS: fix max ea value size (bsc#1144333, bsc#1154355).
  o Documentation: debugfs: Document debugfs helper for unsigned long values
    (git-fixes).
  o Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).
  o EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).
  o HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).
  o HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).
  o HID: Fix assumption that devices have inputs (git-fixes).
  o HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#
    1051510).
  o HID: wacom: generic: Treat serial number and related fields as unsigned
    (git-fixes).
  o Input: ff-memless - kill timer in destroy() (bsc#1051510).
  o Input: silead - try firmware reload after unsuccessful resume (bsc#
    1051510).
  o Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).
  o Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).
  o Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#
    1051510).
  o Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver
    (bsc#1051510).
  o Input: synaptics-rmi4 - do not consume more data than we have (F11, F12)
    (bsc#1051510).
  o Input: synaptics-rmi4 - fix video buffer size (git-fixes).
  o KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc
    #1158064).
  o KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).
  o KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#
    1158067).
  o KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).
  o NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error
    (git-fixes).
  o PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).
  o PCI/PME: Fix possible use-after-free on remove (git-fixes).
  o PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).
  o PM / devfreq: Check NULL governor in available_governors_show (git-fixes).
  o PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).
  o PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).
  o PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).
  o PM / devfreq: passive: fix compiler warning (bsc#1051510).
  o PM / hibernate: Check the success of generating md5 digest before
    hibernation (bsc#1051510).
  o README.BRANCH: Add Denis as branch maintainer
  o Revert synaptics-rmi4 patch due to regression (bsc#1155982) Also
    blacklisting it
  o UAS: Revert commit 3ae62a42090f ("UAS: fix alignment of scatter/gather
    segments").
  o USB: chaoskey: fix error case of a timeout (git-fixes).
  o USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).
  o USB: ldusb: fix control-message timeout (bsc#1051510).
  o USB: ldusb: fix ring-buffer locking (bsc#1051510).
  o USB: serial: mos7720: fix remote wakeup (git-fixes).
  o USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).
  o USB: serial: mos7840: fix remote wakeup (git-fixes).
  o USB: serial: option: add support for DW5821e with eSIM support (bsc#
    1051510).
  o USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#
    1051510).
  o USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).
  o USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).
  o USBIP: add config dependency for SGL_ALLOC (git-fixes).
  o appledisplay: fix error handling in the scheduled work (git-fixes).
  o arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and
    mark driver omap-rng as supported.
  o ata: ep93xx: Use proper enums for directions (bsc#1051510).
  o ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#
    1051510).
  o ath10k: fix vdev-start timeout on error (bsc#1051510).
  o ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).
  o ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).
  o ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).
  o ath9k: add back support for using active monitor interfaces for tx99 (bsc#
    1051510).
  o ath9k: fix reporting calculated new FFT upper max (bsc#1051510).
  o ath9k: fix tx99 with monitor mode interface (bsc#1051510).
  o ath9k_hw: fix uninitialized variable data (bsc#1051510).
  o ax88172a: fix information leak on short answers (bsc#1051510).
  o backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#
    1051510).
  o brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#
    1051510).
  o brcmfmac: reduce timeout for action frame scan (bsc#1051510).
  o brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).
  o brcmsmac: never log "tid x is not agg'able" by default (bsc#1051510).
  o can: c_can: c_can_poll(): only read status register after status IRQ
    (git-fixes).
  o can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).
  o can: mcba_usb: fix use-after-free on disconnect (git-fixes).
  o can: peak_usb: fix a potential out-of-sync while decoding packets
    (git-fixes).
  o can: peak_usb: fix slab info leak (git-fixes).
  o can: rx-offload: can_rx_offload_offload_one(): do not increase the
    skb_queue beyond skb_queue_len_max (git-fixes).
  o can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid
    skb mem leak (git-fixes).
  o can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb
    mem leak (git-fixes).
  o can: usb_8dev: fix use-after-free on disconnect (git-fixes).
  o ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).
  o ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#
    1157184).
  o ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).
  o ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).
  o cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#
    1051510).
  o cfg80211: Prevent regulatory restore during STA disconnect in concurrent
    interfaces (bsc#1051510).
  o cfg80211: call disconnect_wk when AP stops (bsc#1051510).
  o cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#
    1144333, bsc#1154355).
  o cifs: Fix missed free operations (bsc#1144333, bsc#1154355).
  o cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).
  o cifs: add a helper to find an existing readable handle to a file (bsc#
    1144333, bsc#1154355).
  o cifs: create a helper to find a writeable handle by path name (bsc#1144333,
    bsc#1154355).
  o cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#
    1154355).
  o cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#
    1154355).
  o cifs: set domainName when a domain-key is used in multiuser (bsc#1144333,
    bsc#1154355).
  o cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic
    (bsc#1144333, bsc#1154355).
  o cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#
    1144333, bsc#1154355).
  o clk: at91: avoid sleeping early (git-fixes).
  o clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).
  o clk: samsung: Use clk_hw API for calling clk framework from clk notifiers
    (bsc#1051510).
  o clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/
    resume (bsc#1051510).
  o clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume
    (git-fixes).
  o clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).
  o clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#
    1051510).
  o clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).
  o component: fix loop condition to call unbind() if bind() fails (bsc#
    1051510).
  o cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).
  o cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).
  o cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).
  o cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#
    1051510).
  o cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).
  o cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).
  o cpupower : frequency-set -r option misses the last cpu in related cpu list
    (bsc#1051510).
  o cpupower: Fix coredump on VMWare (bsc#1051510).
  o crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).
  o crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).
  o crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).
  o crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).
  o crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).
  o crypto: mxs-dcp - Fix AES issues (bsc#1051510).
  o crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).
  o crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash'
    static (bsc#1051510).
  o crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).
  o crypto: tgr192 - remove unneeded semicolon (bsc#1051510).
  o cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).
  o cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).
  o dccp: do not leak jiffies on the wire (networking-stable-19_11_05).
  o dlm: do not leak kernel pointer to userspace (bsc#1051510).
  o dlm: fix invalid free (bsc#1051510).
  o dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#
    1051510).
  o dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).
  o dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).
  o dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#
    1051510).
  o dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).
  o dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).
  o dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).
  o dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).
  o docs: move protection-keys.rst to the core-api book (bsc#1078248).
  o drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)
  o drm/omap: fix max fclk divider for omap36xx (bsc#1113722)
  o drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).
  o drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)
  o e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).
  o e1000e: Use dev_get_drvdata where possible (bsc#1158049).
  o e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm
    (bsc#1158049).
  o extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).
  o fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).
  o fbdev: sbuslib: use checked version of put_user() (bsc#1051510).
  o gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#
    1051510).
  o gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).
  o gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist
    (bsc#1051510).
  o gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).
  o hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).
  o hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).
  o hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).
  o hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled
    (bsc#1051510).
  o hypfs: Fix error number left in struct pointer member (bsc#1051510).
  o ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
  o ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
  o ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
  o ibmvnic: Terminate waiting device threads after loss of service (bsc#
    1155689 ltc#182047).
  o iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).
  o iio: adc: stm32-adc: fix stopping dma (git-fixes).
  o iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).
  o iio: imu: adis16480: assign bias value only if operation succeeded
    (git-fixes).
  o iio: imu: adis16480: make sure provided frequency is positive (git-fixes).
  o iio: imu: adis: assign read val in debugfs hook only if op successful
    (git-fixes).
  o iio: imu: adis: assign value only if return code zero in read funcs
    (git-fixes).
  o include/linux/bitrev.h: fix constant bitrev (bsc#1114279).
  o inet: stop leaking jiffies on the wire (networking-stable-19_11_05).
  o intel_th: Fix a double put_device() in error path (git-fixes).
  o iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#
    1158063).
  o ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#
    1051510).
  o ipv4: Return -ENETUNREACH if we can't create route but saddr is valid
    (networking-stable-19_10_24).
  o iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).
  o iwlwifi: check kasprintf() return value (bsc#1051510).
  o iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).
  o iwlwifi: exclude GEO SAR support for 3168 (git-fixes).
  o iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).
  o iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).
  o kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).
  o kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).
  o kABI: Fix for "KVM: x86: Introduce vcpu->arch.xsaves_enabled" (bsc#
    1158066).
  o lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).
  o lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).
  o liquidio: fix race condition in instruction completion processing (bsc#
    1051510).
  o loop: add ioctl for changing logical block size (bsc#1108043).
  o mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#
    1051510).
  o mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).
  o mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).
  o mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#
    1051510).
  o macvlan: schedule bc_work even if error (bsc#1051510).
  o mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone
    (git-fixes).
  o media: au0828: Fix incorrect error messages (bsc#1051510).
  o media: bdisp: fix memleak on release (git-fixes).
  o media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).
  o media: davinci: Fix implicit enum conversion warning (bsc#1051510).
  o media: exynos4-is: Fix recursive locking in isp_video_release()
    (git-fixes).
  o media: fix: media: pci: meye: validate offset to avoid arbitrary access
    (bsc#1051510).
  o media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).
  o media: imon: invalid dereference in imon_touch_event (bsc#1051510).
  o media: isif: fix a NULL pointer dereference bug (bsc#1051510).
  o media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc
    #1051510).
  o media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).
  o media: radio: wl1273: fix interrupt masking on release (git-fixes).
  o media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).
  o media: usbvision: Fix races among open, close, and disconnect (bsc#
    1051510).
  o media: vim2m: Fix abort issue (git-fixes).
  o media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#
    1051510).
  o mei: fix modalias documentation (git-fixes).
  o mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).
  o mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#
    1051510).
  o mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).
  o mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).
  o mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).
  o mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable
    (bsc#1051510).
  o mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
    (git fixes (mm/gup)).
  o mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new
    zone (git fixes (mm/compaction)).
  o mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).
  o mmc: core: fix wl1251 sdio quirks (git-fixes).
  o mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of
    pandora_wl1251_init_card (git-fixes).
  o mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail
    (bsc#1051510).
  o mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).
  o mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).
  o mmc: sdio: fix wl1251 vendor id (git-fixes).
  o mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).
  o mtd: nand: mtk: fix incorrect register setting order about ecc irq.
  o mtd: spear_smi: Fix Write Burst mode (bsc#1051510).
  o mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).
  o mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).
  o net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc
    #1089644, ltc#166495, ltc#165544, git-fixes).
  o net/mlx4_core: Dynamically set guaranteed amount of counters per VF
    (networking-stable-19_11_05).
  o net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget
    (networking-stable-19_11_05).
  o net/smc: Fix error path in smc_init (git-fixes).
  o net/smc: avoid fallback in case of non-blocking connect (git-fixes).
  o net/smc: fix closing of fallback SMC sockets (git-fixes).
  o net/smc: fix ethernet interface refcounting (git-fixes).
  o net/smc: fix refcounting for non-blocking connect() (git-fixes).
  o net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).
  o net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()
    (networking-stable-19_11_05).
  o net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
    (networking-stable-19_11_05).
  o net: add skb_queue_empty_lockless() (networking-stable-19_11_05).
  o net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).
  o net: annotate lockless accesses to sk->sk_napi_id
    (networking-stable-19_11_05).
  o net: avoid potential infinite loop in tc_ctl_action()
    (networking-stable-19_10_24).
  o net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3
    (networking-stable-19_10_24).
  o net: bcmgenet: Set phydev->dev_flags only for internal PHYs
    (networking-stable-19_10_24).
  o net: bcmgenet: reset 40nm EPHY on energy detect
    (networking-stable-19_11_05).
  o net: dsa: b53: Do not clear existing mirrored port mask
    (networking-stable-19_11_05).
  o net: dsa: bcm_sf2: Fix IMP setup for port different than 8
    (networking-stable-19_11_05).
  o net: dsa: fix switch tree list (networking-stable-19_11_05).
  o net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum
    (networking-stable-19_11_05).
  o net: fix sk_page_frag() recursion from memory reclaim
    (networking-stable-19_11_05).
  o net: hisilicon: Fix ping latency when deal with high throughput
    (networking-stable-19_11_05).
  o net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow
    (networking-stable-19_10_24).
  o net: use skb_queue_empty_lockless() in busy poll contexts
    (networking-stable-19_11_05).
  o net: use skb_queue_empty_lockless() in poll() handlers
    (networking-stable-19_11_05).
  o net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions
    (git-fixes).
  o net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition
    (git-fixes).
  o netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).
  o nfc: netlink: fix double device reference drop (git-fixes).
  o nfc: port100: handle command failure cleanly (git-fixes).
  o nl80211: Fix a GET_KEY reply attribute (bsc#1051510).
  o openvswitch: fix flow command message size (git-fixes).
  o padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
    (git-fixes).
  o phy: phy-twl4030-usb: fix denied runtime access (git-fixes).
  o pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args
    call (git-fixes).
  o pinctrl: at91: do not use the same irqchip with multiple gpiochips
    (git-fixes).
  o pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).
  o pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).
  o pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#
    1051510).
  o pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).
  o pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup
    controller init (bsc#1051510).
  o pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup
    controller init (bsc#1051510).
  o pinctrl: samsung: Fix device node refcount leaks in init code (bsc#
    1051510).
  o pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#
    1051510).
  o pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#
    1051510).
  o power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc
    #1051510).
  o power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#
    1051510).
  o power: supply: max14656: fix potential use-after-free (bsc#1051510).
  o power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc
    #1051510).
  o power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#
    1051510).
  o powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
  o powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary
    is full (bsc#1157778 ltc#182520).
  o powerpc/bpf: Fix tail call implementation (bsc#1157698).
  o powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc
    #1157778 ltc#182520).
  o powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).
  o powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#
    1156700 ltc#182459).
  o powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#
    182459).
  o powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
  o powerpc/security: Fix wrong message when RFI Flush is disable (bsc#
    1131107).
  o powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#
    1156882 ltc#182435).
  o ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).
  o pwm: bcm-iproc: Prevent unloading the driver module while in use
    (git-fixes).
  o pwm: lpss: Only set update bit if we are actually changing the settings
    (bsc#1051510).
  o r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2
    (networking-stable-19_11_05).
  o regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).
  o regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#
    1051510).
  o remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).
  o reset: Fix potential use-after-free in __of_reset_control_get() (bsc#
    1051510).
  o reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).
  o reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).
  o rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let
    COMPRESS_VMLINUX determine the compression used for vmlinux. By default
    (historically), it is gz.
  o rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)
  o rtl8187: Fix warning generated when strncpy() destination length matches
    the sixe argument (bsc#1051510).
  o rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).
  o rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).
  o rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#
    1051510).
  o rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).
  o s390/bpf: fix lcgr instruction encoding (bsc#1051510).
  o s390/bpf: use 32-bit index for tail calls (bsc#1051510).
  o s390/cio: avoid calling strlen on null pointer (bsc#1051510).
  o s390/cio: exclude subchannels with no parent from pseudo check (bsc#
    1051510).
  o s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).
  o s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).
  o s390/idle: fix cpu idle time calculation (bsc#1051510).
  o s390/process: avoid potential reading of freed stack (bsc#1051510).
  o s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).
  o s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#
    1051510).
  o s390/qeth: return proper errno on IO error (bsc#1051510).
  o s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#
    1140948).
  o s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).
  o s390/topology: avoid firing events before kobjs are created (bsc#1051510).
  o s390: fix stfle zero padding (bsc#1051510).
  o sc16is7xx: Fix for "Unexpected interrupt: 8" (bsc#1051510).
  o scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#
    1151900).
  o scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).
  o scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).
  o scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424,
    bsc#1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#
    1117169, bsc#1151548).
  o scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908.
    bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc
    #1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#
    1154526 bsc#1048942).
  o scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706
    bsc#1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635
    bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526
    bsc#1048942).
  o scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424,
    bsc#1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#
    1154526 bsc#1048942).
  o scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635
    bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908.
    bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908.
    bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#
    1138039).
  o scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#
    1154526 bsc#1048942).
  o scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).
  o scsi: sd: Ignore a failure to sync cache due to lack of authorization
    (git-fixes).
  o scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).
  o scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956
    LTC#182054).
  o scsi: zfcp: fix request object use-after-free in send path causing wrong
    traces (bsc#1051510).
  o sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).
  o sctp: Fixed a regression (bsc#1158082).
  o selftests: net: reuseport_dualstack: fix uninitalized parameter
    (networking-stable-19_11_05).
  o serial: fix kernel-doc warning in comments (bsc#1051510).
  o serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).
  o serial: mxs-auart: Fix potential infinite loop (bsc#1051510).
  o serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#
    1051510).
  o serial: uartlite: fix exit path null pointer (bsc#1051510).
  o serial: uartps: Fix suspend functionality (bsc#1051510).
  o signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).
  o slcan: Fix memory leak in error path (bsc#1051510).
  o slip: Fix memory leak in slip_open error path (bsc#1051510).
  o slip: Fix use-after-free Read in slip_open (bsc#1051510).
  o smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#
    1154355).
  o smb3: fix leak in "open on server" perf counter (bsc#1144333, bsc#1154355).
  o smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).
  o smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).
  o smb3: improve handling of share deleted (and share recreated) (bsc#1144333,
    bsc#1154355).
  o soc: imx: gpc: fix PDN delay (bsc#1051510).
  o soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).
  o spi: atmel: Fix CS high support (bsc#1051510).
  o spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).
  o spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).
  o spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).
  o spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#
    1051510).
  o spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).
  o spi: rockchip: initialize dma_slave_config properly (bsc#1051510).
  o spi: spidev: Fix OF tree warning logic (bsc#1051510).
  o staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).
  o thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).
  o tpm: add check after commands attribs tab allocation (bsc#1051510).
  o tracing: Get trace_array reference for available_tracers files (bsc#
    1156429).
  o udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).
  o usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).
  o usb-storage: Revert commit 747668dbc061 ("usb-storage: Set
    virt_boundary_mask to avoid SG overflows") (bsc#1051510).
  o usb: chipidea: Fix otg event handler (bsc#1051510).
  o usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already
    started (bsc#1051510).
  o usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).
  o usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).
  o usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in
    fotg210_get_status() (bsc#1051510).
  o usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).
  o usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#
    1051510).
  o usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#
    1051510).
  o usb: gadget: uvc: configfs: Prevent format changes after linking header
    (bsc#1051510).
  o usb: handle warm-reset port requests on hub resume (bsc#1051510).
  o usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).
  o usbip: Fix free of unallocated memory in vhci tx (git-fixes).
  o usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path
    (git-fixes).
  o usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).
  o usbip: tools: fix fd leakage in the function of read_attr_usbip_status
    (git-fixes).
  o vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).
  o vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#
    1051510).
  o vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).
  o video/hdmi: Fix AVI bar unpack (git-fixes).
  o virtio/s390: fix race on airq_areas (bsc#1051510).
  o virtio_console: allocate inbufs in add_port() only if it is needed
    (git-fixes).
  o virtio_ring: fix return code on DMA mapping fails (git-fixes).
  o vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).
  o watchdog: meson: Fix the wrong value of left time (bsc#1051510).
  o x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
  o x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#
    1153811).
  o x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#
    1078248).
  o x86/pkeys: Update documentation about availability (bsc#1078248).
  o x86/resctrl: Fix potential lockdep warning (bsc#1114279).
  o x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#
    1114279).
  o x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#
    1158068).
  o xfrm: Fix xfrm sel prefix length validation (git-fixes).
  o xfrm: fix sa selector validation (bsc#1156609).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Workstation Extension 12-SP4:
    zypper in -t patch SUSE-SLE-WE-12-SP4-2019-3371=1
  o SUSE Linux Enterprise Software Development Kit 12-SP4:
    zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-3371=1
  o SUSE Linux Enterprise Server 12-SP4:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-3371=1
  o SUSE Linux Enterprise Live Patching 12-SP4:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2019-3371=1
  o SUSE Linux Enterprise High Availability 12-SP4:
    zypper in -t patch SUSE-SLE-HA-12-SP4-2019-3371=1
  o SUSE Linux Enterprise Desktop 12-SP4:
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-3371=1

Package List:

  o SUSE Linux Enterprise Workstation Extension 12-SP4 (x86_64):
       kernel-default-debuginfo-4.12.14-95.45.1
       kernel-default-debugsource-4.12.14-95.45.1
       kernel-default-extra-4.12.14-95.45.1
       kernel-default-extra-debuginfo-4.12.14-95.45.1
  o SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le
    s390x x86_64):
       kernel-obs-build-4.12.14-95.45.1
       kernel-obs-build-debugsource-4.12.14-95.45.1
  o SUSE Linux Enterprise Software Development Kit 12-SP4 (noarch):
       kernel-docs-4.12.14-95.45.1
  o SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
       kernel-default-4.12.14-95.45.1
       kernel-default-base-4.12.14-95.45.1
       kernel-default-base-debuginfo-4.12.14-95.45.1
       kernel-default-debuginfo-4.12.14-95.45.1
       kernel-default-debugsource-4.12.14-95.45.1
       kernel-default-devel-4.12.14-95.45.1
       kernel-syms-4.12.14-95.45.1
  o SUSE Linux Enterprise Server 12-SP4 (x86_64):
       kernel-default-devel-debuginfo-4.12.14-95.45.1
  o SUSE Linux Enterprise Server 12-SP4 (noarch):
       kernel-devel-4.12.14-95.45.1
       kernel-macros-4.12.14-95.45.1
       kernel-source-4.12.14-95.45.1
  o SUSE Linux Enterprise Server 12-SP4 (s390x):
       kernel-default-man-4.12.14-95.45.1
  o SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le x86_64):
       kernel-default-kgraft-4.12.14-95.45.1
       kernel-default-kgraft-devel-4.12.14-95.45.1
       kgraft-patch-4_12_14-95_45-default-1-6.5.1
  o SUSE Linux Enterprise High Availability 12-SP4 (ppc64le s390x x86_64):
       cluster-md-kmp-default-4.12.14-95.45.1
       cluster-md-kmp-default-debuginfo-4.12.14-95.45.1
       dlm-kmp-default-4.12.14-95.45.1
       dlm-kmp-default-debuginfo-4.12.14-95.45.1
       gfs2-kmp-default-4.12.14-95.45.1
       gfs2-kmp-default-debuginfo-4.12.14-95.45.1
       kernel-default-debuginfo-4.12.14-95.45.1
       kernel-default-debugsource-4.12.14-95.45.1
       ocfs2-kmp-default-4.12.14-95.45.1
       ocfs2-kmp-default-debuginfo-4.12.14-95.45.1
  o SUSE Linux Enterprise Desktop 12-SP4 (noarch):
       kernel-devel-4.12.14-95.45.1
       kernel-macros-4.12.14-95.45.1
       kernel-source-4.12.14-95.45.1
  o SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
       kernel-default-4.12.14-95.45.1
       kernel-default-debuginfo-4.12.14-95.45.1
       kernel-default-debugsource-4.12.14-95.45.1
       kernel-default-devel-4.12.14-95.45.1
       kernel-default-devel-debuginfo-4.12.14-95.45.1
       kernel-default-extra-4.12.14-95.45.1
       kernel-default-extra-debuginfo-4.12.14-95.45.1
       kernel-syms-4.12.14-95.45.1


References:

  o https://www.suse.com/security/cve/CVE-2019-14895.html
  o https://www.suse.com/security/cve/CVE-2019-15916.html
  o https://www.suse.com/security/cve/CVE-2019-16231.html
  o https://www.suse.com/security/cve/CVE-2019-17055.html
  o https://www.suse.com/security/cve/CVE-2019-18660.html
  o https://www.suse.com/security/cve/CVE-2019-18683.html
  o https://www.suse.com/security/cve/CVE-2019-18805.html
  o https://www.suse.com/security/cve/CVE-2019-18809.html
  o https://www.suse.com/security/cve/CVE-2019-19049.html
  o https://www.suse.com/security/cve/CVE-2019-19052.html
  o https://www.suse.com/security/cve/CVE-2019-19056.html
  o https://www.suse.com/security/cve/CVE-2019-19057.html
  o https://www.suse.com/security/cve/CVE-2019-19058.html
  o https://www.suse.com/security/cve/CVE-2019-19060.html
  o https://www.suse.com/security/cve/CVE-2019-19062.html
  o https://www.suse.com/security/cve/CVE-2019-19063.html
  o https://www.suse.com/security/cve/CVE-2019-19065.html
  o https://www.suse.com/security/cve/CVE-2019-19067.html
  o https://www.suse.com/security/cve/CVE-2019-19068.html
  o https://www.suse.com/security/cve/CVE-2019-19073.html
  o https://www.suse.com/security/cve/CVE-2019-19074.html
  o https://www.suse.com/security/cve/CVE-2019-19075.html
  o https://www.suse.com/security/cve/CVE-2019-19077.html
  o https://www.suse.com/security/cve/CVE-2019-19227.html
  o https://bugzilla.suse.com/1048942
  o https://bugzilla.suse.com/1051510
  o https://bugzilla.suse.com/1078248
  o https://bugzilla.suse.com/1082635
  o https://bugzilla.suse.com/1089644
  o https://bugzilla.suse.com/1091041
  o https://bugzilla.suse.com/1108043
  o https://bugzilla.suse.com/1113722
  o https://bugzilla.suse.com/1114279
  o https://bugzilla.suse.com/1117169
  o https://bugzilla.suse.com/1131107
  o https://bugzilla.suse.com/1138039
  o https://bugzilla.suse.com/1140948
  o https://bugzilla.suse.com/1143706
  o https://bugzilla.suse.com/1144333
  o https://bugzilla.suse.com/1149448
  o https://bugzilla.suse.com/1150466
  o https://bugzilla.suse.com/1151548
  o https://bugzilla.suse.com/1151900
  o https://bugzilla.suse.com/1152782
  o https://bugzilla.suse.com/1153628
  o https://bugzilla.suse.com/1153681
  o https://bugzilla.suse.com/1153811
  o https://bugzilla.suse.com/1154043
  o https://bugzilla.suse.com/1154058
  o https://bugzilla.suse.com/1154124
  o https://bugzilla.suse.com/1154355
  o https://bugzilla.suse.com/1154526
  o https://bugzilla.suse.com/1154956
  o https://bugzilla.suse.com/1155021
  o https://bugzilla.suse.com/1155689
  o https://bugzilla.suse.com/1155692
  o https://bugzilla.suse.com/1155836
  o https://bugzilla.suse.com/1155897
  o https://bugzilla.suse.com/1155921
  o https://bugzilla.suse.com/1155982
  o https://bugzilla.suse.com/1156187
  o https://bugzilla.suse.com/1156258
  o https://bugzilla.suse.com/1156429
  o https://bugzilla.suse.com/1156466
  o https://bugzilla.suse.com/1156471
  o https://bugzilla.suse.com/1156494
  o https://bugzilla.suse.com/1156609
  o https://bugzilla.suse.com/1156700
  o https://bugzilla.suse.com/1156729
  o https://bugzilla.suse.com/1156882
  o https://bugzilla.suse.com/1157038
  o https://bugzilla.suse.com/1157042
  o https://bugzilla.suse.com/1157070
  o https://bugzilla.suse.com/1157143
  o https://bugzilla.suse.com/1157145
  o https://bugzilla.suse.com/1157158
  o https://bugzilla.suse.com/1157162
  o https://bugzilla.suse.com/1157171
  o https://bugzilla.suse.com/1157173
  o https://bugzilla.suse.com/1157178
  o https://bugzilla.suse.com/1157180
  o https://bugzilla.suse.com/1157182
  o https://bugzilla.suse.com/1157183
  o https://bugzilla.suse.com/1157184
  o https://bugzilla.suse.com/1157191
  o https://bugzilla.suse.com/1157193
  o https://bugzilla.suse.com/1157197
  o https://bugzilla.suse.com/1157298
  o https://bugzilla.suse.com/1157307
  o https://bugzilla.suse.com/1157324
  o https://bugzilla.suse.com/1157333
  o https://bugzilla.suse.com/1157424
  o https://bugzilla.suse.com/1157463
  o https://bugzilla.suse.com/1157499
  o https://bugzilla.suse.com/1157678
  o https://bugzilla.suse.com/1157698
  o https://bugzilla.suse.com/1157778
  o https://bugzilla.suse.com/1157908
  o https://bugzilla.suse.com/1158049
  o https://bugzilla.suse.com/1158063
  o https://bugzilla.suse.com/1158064
  o https://bugzilla.suse.com/1158065
  o https://bugzilla.suse.com/1158066
  o https://bugzilla.suse.com/1158067
  o https://bugzilla.suse.com/1158068
  o https://bugzilla.suse.com/1158082


===============================================================================

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2019:3372-1
Rating:            important
References:        #1048942 #1051510 #1071995 #1078248 #1082635 #1089644
                   #1091041 #1103990 #1103991 #1104353 #1104427 #1104745
                   #1108043 #1109837 #1111666 #1112178 #1112374 #1113722
                   #1113956 #1113994 #1114279 #1117169 #1118661 #1119113
                   #1120853 #1126390 #1127354 #1127371 #1129770 #1131107
                   #1134983 #1135966 #1135967 #1137223 #1137236 #1138039
                   #1140948 #1142095 #1142635 #1142924 #1143706 #1144333
                   #1146544 #1149448 #1150466 #1151067 #1151548 #1151900
                   #1152782 #1153628 #1153811 #1154043 #1154058 #1154124
                   #1154355 #1154526 #1154601 #1155021 #1155689 #1155692
                   #1155836 #1155897 #1155921 #1156187 #1156258 #1156429
                   #1156466 #1156471 #1156494 #1156609 #1156700 #1156729
                   #1156882 #1156928 #1157032 #1157038 #1157042 #1157044
                   #1157045 #1157046 #1157049 #1157070 #1157115 #1157143
                   #1157145 #1157158 #1157160 #1157162 #1157171 #1157173
                   #1157178 #1157180 #1157182 #1157183 #1157184 #1157191
                   #1157193 #1157197 #1157298 #1157304 #1157307 #1157324
                   #1157333 #1157386 #1157424 #1157463 #1157499 #1157678
                   #1157698 #1157778 #1157908 #1158049 #1158063 #1158064
                   #1158065 #1158066 #1158067 #1158068 #1158071 #1158082
                   #1158381 #1158394 #1158398 #1158407 #1158410 #1158413
                   #1158417 #1158427 #1158445 #1158637 #1158638 #1158639
                   #1158640 #1158641 #1158643 #1158644 #1158645 #1158646
                   #1158647 #1158649 #1158651 #1158652
Cross-References:  CVE-2019-0154 CVE-2019-14895 CVE-2019-14901 CVE-2019-15213
                   CVE-2019-15916 CVE-2019-16231 CVE-2019-17055 CVE-2019-18660
                   CVE-2019-18683 CVE-2019-18805 CVE-2019-18809 CVE-2019-19046
                   CVE-2019-19049 CVE-2019-19052 CVE-2019-19056 CVE-2019-19057
                   CVE-2019-19058 CVE-2019-19060 CVE-2019-19062 CVE-2019-19063
                   CVE-2019-19065 CVE-2019-19067 CVE-2019-19068 CVE-2019-19073
                   CVE-2019-19074 CVE-2019-19075 CVE-2019-19077 CVE-2019-19078
                   CVE-2019-19080 CVE-2019-19081 CVE-2019-19082 CVE-2019-19083
                   CVE-2019-19227 CVE-2019-19524 CVE-2019-19525 CVE-2019-19528
                   CVE-2019-19529 CVE-2019-19530 CVE-2019-19531 CVE-2019-19534
                   CVE-2019-19536 CVE-2019-19543
Affected Products:
                   SUSE Linux Enterprise Module for Public Cloud 15-SP1
______________________________________________________________________________

An update that solves 42 vulnerabilities and has 100 fixes is now available.

Description:


The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  o CVE-2019-15213: An issue was discovered in the Linux kernel, there was a
    use-after-free caused by a malicious USB device in the drivers/media/usb/
    dvb-usb/dvb-usb-init.c driver (bnc#1146544).
  o CVE-2019-19531: There was a use-after-free bug that can be caused by a
    malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).
  o CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in
    drivers/media/rc/serial_ir.c (bnc#1158427).
  o CVE-2019-19525: There was a use-after-free bug that can be caused by a
    malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#
    1158417).
  o CVE-2019-19530: There was a use-after-free bug that can be caused by a
    malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#
    1158410).
  o CVE-2019-19536: There was an info-leak bug that can be caused by a
    malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c
    driver (bnc#1158394).
  o CVE-2019-19524: There was a use-after-free bug that can be caused by a
    malicious USB device in the drivers/input/ff-memless.c driver (bnc#
    1158413).
  o CVE-2019-19528: There was a use-after-free bug that can be caused by a
    malicious USB device in the drivers/usb/misc/iowarrior.c driver (bnc#
    1158407).
  o CVE-2019-19534: There was an info-leak bug that can be caused by a
    malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c
    driver (bnc#1158398).
  o CVE-2019-19529: There was a use-after-free bug that can be caused by a
    malicious USB device in the drivers/net/can/usb/mcba_usb.c driver (bnc#
    1158381).
  o CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in
    Marvell WiFi chip driver. The vulnerability allowed a remote attacker to
    cause a system crash, resulting in a denial of service, or execute
    arbitrary code. The highest threat with this vulnerability is with the
    availability of the system. If code execution occurs, the code will run
    with the permissions of root. This will affect both confidentiality and
    integrity of files on the system (bnc#1157042).
  o CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux
    kernel in Marvell WiFi chip driver. The flaw could occur when the station
    attempts a connection negotiation during the handling of the remote devices
    country settings. This could have allowed the remote device to cause a
    denial of service (system crash) or possibly execute arbitrary code (bnc#
    1157158).
  o CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure
    because the Spectre-RSB mitigation is not in place for all applicable CPUs.
    This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/
    security.c (bnc#1157038).
  o CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in
    the Linux kernel. It is exploitable for privilege escalation on some Linux
    distributions where local users have /dev/video0 access, but only if the
    driver happens to be loaded. There are multiple race conditions during
    streaming stopping in this driver (part of the V4L2 subsystem). These
    issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap
    (), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the
    corresponding kthreads. At least one of these race conditions leads to a
    use-after-free (bnc#1155897).
  o CVE-2019-18809: A memory leak in the af9005_identify_state() function in
    drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to
    cause a denial of service (memory consumption) (bnc#1156258).
  o CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in
    drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel allowed attackers
    to cause a denial of service (memory consumption) by triggering
    ida_simple_get() failure (bnc#1157304).
  o CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in
    drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel allowed attackers
    to cause a denial of service (memory consumption) by triggering
    usb_submit_urb() failures (bnc#1157032).
  o CVE-2019-19062: A memory leak in the crypto_report() function in crypto/
    crypto_user_base.c in the Linux kernel allowed attackers to cause a denial
    of service (memory consumption) by triggering crypto_report_alg() failures
    (bnc#1157333).
  o CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring()
    function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel
    allowed attackers to cause a denial of service (memory consumption) by
    triggering mwifiex_map_pci_memory() failures (bnc#1157197).
  o CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf()
    function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel
    allowed attackers to cause a denial of service (memory consumption) by
    triggering mwifiex_map_pci_memory() failures (bnc#1157197).
  o CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in
    drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel
    allowed attackers to cause a denial of service (memory consumption) by
    triggering usb_submit_urb() failures (bnc#1157307).
  o CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers
    /net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers
    to cause a denial of service (memory consumption) (bnc#1157298).
  o CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a
    potential NULL pointer dereference because register_snap_client may return
    NULL. This will lead to denial of service in net/appletalk/aarp.c and net/
    appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).
  o CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function
    in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel
    allowed attackers to cause a denial of service (memory consumption) (bnc#
    1157045).
  o CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs()
    function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux
    kernel allowed attackers to cause a denial of service (memory consumption)
    (bnc#1157044).
  o CVE-2019-19065: A memory leak in the sdma_init() function in drivers/
    infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a
    denial of service (memory consumption) by triggering rhashtable_init()
    failures (bnc#1157191).
  o CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in
    drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed
    attackers to cause a denial of service (memory consumption) by triggering
    copy to udata failures (bnc#1157171).
  o CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/
    can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of
    service (memory consumption) by triggering usb_submit_urb() failures (bnc#
    1157324).
  o CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/
    gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to
    cause a denial of service (memory consumption) by triggering
    mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).
  o CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in
    drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to
    cause a denial of service (memory consumption) (bnc#1157178).
  o CVE-2019-19049: A memory leak in the unittest_data_add() function in
    drivers/of/unittest.c in the Linux kernel allowed attackers to cause a
    denial of service (memory consumption) by triggering of_fdt_unflatten_tree
    () failures (bsc#1157173).
  o CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net
    /ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a
    denial of service (memory consumption) by triggering
    ca8210_get_platform_data() failures (bnc#1157162).
  o CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/
    net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers
    to cause a denial of service (memory consumption) by triggering alloc_page
    () failures (bnc#1157145).
  o CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/
    net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause
    a denial of service (memory consumption) (bnc#1157143).
  o CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in
    the Linux kernel allowed attackers to cause a denial of service (memory
    consumption) by triggering wait_for_completion_timeout() failures. This
    affects the htc_config_pipe_credits() function, the htc_setup_complete()
    function, and the htc_connect_service() function (bnc#1157070).
  o CVE-2019-19083: Memory leaks in *clock_source_create() functions under
    drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to
    cause a denial of service (memory consumption). This affects the
    dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/
    dce112/dce112_resource.c, the dce100_clock_source_create() function in
    drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the
    dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/
    dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers
    /gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the
    dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/
    dce120/dce120_resource.c, the dce110_clock_source_create() function in
    drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the
    dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/
    dce80/dce80_resource.c (bnc#1157049).
  o CVE-2019-19082: Memory leaks in *create_resource_pool() functions under
    drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to
    cause a denial of service (memory consumption). This affects the
    dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/
    dce120/dce120_resource.c, the dce110_create_resource_pool() function in
    drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the
    dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/
    dce100/dce100_resource.c, the dcn10_create_resource_pool() function in
    drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the
    dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/
    dce112/dce112_resource.c (bnc#1157046).
  o CVE-2019-15916: An issue was discovered in the Linux kernel There was a
    memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which
    will cause denial of service (bnc#1149448).
  o CVE-2019-0154: Insufficient access control in subsystem for Intel (R)
    processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM)
    Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold
    Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel
    (R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor
    E3-1500 v5 and v6 and E-2100 Processor Families may have allowed an
    authenticated user to potentially enable denial of service via local access
    (bnc#1135966).
  o CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did
    not check the alloc_workqueue return value, leading to a NULL pointer
    dereference (bnc#1150466).
  o CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in
    the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow
    in tcp_ack_update_rtt() when userspace writes a very large integer to /proc
    /sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly
    unspecified other impact (bnc#1156187).
  o CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the
    AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW,
    which means that unprivileged users can create a raw socket (bnc#1152782).

The following non-security bugs were fixed:

  o bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)
  o ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask
    (bsc#1051510).
  o ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).
  o ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug
    bridge (bsc#1111666).
  o ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).
  o ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).
  o ALSA: 6fire: Drop the dead code (git-fixes).
  o ALSA: bebob: fix to detect configured source of sampling clock for
    Focusrite Saffire Pro i/o series (git-fixes).
  o ALSA: cs4236: fix error return comparison of an unsigned integer
    (git-fixes).
  o ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).
  o ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).
  o ALSA: hda - Fix pending unsol events at shutdown (git-fixes).
  o ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).
  o ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding (git-fixes).
  o ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).
  o ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).
  o ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop
    (git-fixes).
  o ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).
  o ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).
  o ALSA: hda: Add Cometlake-S PCI ID (git-fixes).
  o ALSA: hda: Fix racy display power access (bsc#1156928).
  o ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).
  o ALSA: hda: hdmi - remove redundant code comments (git-fixes).
  o ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).
  o ALSA: intel8x0m: Register irq handler after register initializations (bsc#
    1051510).
  o ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).
  o ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#
    1111666).
  o ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).
  o ALSA: seq: Do error checks at creating system ports (bsc#1051510).
  o ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).
  o ALSA: usb-audio: Add skip_validation option (git-fixes).
  o ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling
    (git-fixes).
  o ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).
  o ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk()
    (git-fixes).
  o ALSA: usb-audio: Fix incorrect size check for processing/extension units
    (git-fixes).
  o ALSA: usb-audio: Fix missing error check at mixer resolution test
    (git-fixes).
  o ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).
  o ALSA: usb-audio: sound: usb: usb true/false for bool return type
    (git-fixes).
  o ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).
  o ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).
  o ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).
  o ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).
  o ASoC: kirkwood: fix external clock probe defer (git-fixes).
  o ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).
  o ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).
  o ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).
  o ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).
  o ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).
  o Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).
  o Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).
  o Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#
    1051510).
  o Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).
  o Bluetooth: delete a stray unlock (bsc#1051510).
  o Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).
  o Btrfs: fix log context list corruption after rename exchange operation (bsc
    #1156494).
  o CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).
  o CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#
    1154355).
  o CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#
    1154355).
  o CIFS: Fix use after free of file info structures (bsc#1144333, bsc#
    1154355).
  o CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#
    1154355).
  o CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#
    1154355).
  o CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#
    1154355).
  o CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).
  o CIFS: fix max ea value size (bsc#1144333, bsc#1154355).
  o Documentation: debugfs: Document debugfs helper for unsigned long values
    (git-fixes).
  o Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).
  o EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).
  o EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes:
    Do not warn when incrementing refcount on 0 (bsc#1114279).
  o HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).
  o HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).
  o HID: Fix assumption that devices have inputs (git-fixes).
  o HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#
    1051510).
  o HID: wacom: generic: Treat serial number and related fields as unsigned
    (git-fixes).
  o IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).
  o IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#
    1103991).
  o Input: ff-memless - kill timer in destroy() (bsc#1051510).
  o Input: silead - try firmware reload after unsuccessful resume (bsc#
    1051510).
  o Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).
  o Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).
  o Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#
    1051510).
  o Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver
    (bsc#1051510).
  o Input: synaptics-rmi4 - do not consume more data than we have (F11, F12)
    (bsc#1051510).
  o Input: synaptics-rmi4 - fix video buffer size (git-fixes).
  o KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#
    1114279).
  o KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).
  o KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc
    #1158064).
  o KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).
  o KVM: s390: fix __insn32_query() inline assembly (git-fixes).
  o KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).
  o KVM: s390: vsie: Return correct values for Invalid CRYCB format
    (git-fixes).
  o KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#
    1158067).
  o KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).
  o NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error
    (git-fixes).
  o PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).
  o PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).
  o PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#
    1111666).
  o PCI/PME: Fix possible use-after-free on remove (git-fixes).
  o PCI/PTM: Remove spurious "d" from granularity message (bsc#1051510).
  o PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).
  o PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).
  o PCI: dwc: Fix find_next_bit() usage (bsc#1051510).
  o PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).
  o PCI: rcar: Fix missing MACCTLR register setting in initialization sequence
    (bsc#1051510).
  o PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).
  o PCI: tegra: Enable Relaxed Ordering only for Tegra20 and Tegra30
    (git-fixes).
  o PM / devfreq: Check NULL governor in available_governors_show (git-fixes).
  o PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).
  o PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).
  o PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).
  o PM / devfreq: passive: fix compiler warning (bsc#1051510).
  o PM / hibernate: Check the success of generating md5 digest before
    hibernation (bsc#1051510).
  o RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)
  o RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)
  o RDMA/efa: Clear the admin command buffer prior to its submission
    (git-fixes) Patch was already picked through Amazon driver repo but was not
    marked with a Git-commit tag
  o RDMA/hns: Fix comparison of unsigned long variable 'end' with less than
    zero (bsc#1104427 bsc#1137236).
  o RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).
  o RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)
  o README.BRANCH: Removing myself from the maintainer list
  o UAS: Revert commit 3ae62a42090f ("UAS: fix alignment of scatter/gather
    segments").
  o USB: chaoskey: fix error case of a timeout (git-fixes).
  o USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).
  o USB: ldusb: fix control-message timeout (bsc#1051510).
  o USB: ldusb: fix ring-buffer locking (bsc#1051510).
  o USB: misc: appledisplay: fix backlight update_status return code (bsc#
    1051510).
  o USB: serial: mos7720: fix remote wakeup (git-fixes).
  o USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).
  o USB: serial: mos7840: fix remote wakeup (git-fixes).
  o USB: serial: option: add support for DW5821e with eSIM support (bsc#
    1051510).
  o USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#
    1051510).
  o USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).
  o USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).
  o USBIP: add config dependency for SGL_ALLOC (git-fixes).
  o acpi/nfit, device-dax: Identify differentiated memory with a unique
    numa-node (bsc#1158071).
  o appledisplay: fix error handling in the scheduled work (git-fixes).
  o arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and
    mark driver omap-rng as supported.
  o ata: ep93xx: Use proper enums for directions (bsc#1051510).
  o ath10k: Correct error handling of dma_map_single() (bsc#1111666).
  o ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#
    1111666).
  o ath10k: assign 'n_cipher_suites = 11' for WCN3990 to enable WPA3 (bsc#
    1111666).
  o ath10k: avoid possible memory access violation (bsc#1111666).
  o ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#
    1051510).
  o ath10k: fix vdev-start timeout on error (bsc#1051510).
  o ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).
  o ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).
  o ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).
  o ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).
  o ath9k: add back support for using active monitor interfaces for tx99 (bsc#
    1051510).
  o ath9k: fix reporting calculated new FFT upper max (bsc#1051510).
  o ath9k: fix tx99 with monitor mode interface (bsc#1051510).
  o ath9k_hw: fix uninitialized variable data (bsc#1051510).
  o ax88172a: fix information leak on short answers (bsc#1051510).
  o backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#
    1051510).
  o bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).
  o bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)
  o bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)
  o bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).
  o bpf: fix BTF limits (bsc#1109837).
  o bpf: fix BTF verification of enums (bsc#1109837).
  o brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#
    1051510).
  o brcmfmac: fix wrong strnchr usage (bsc#1111666).
  o brcmfmac: increase buffer for obtaining firmware capabilities (bsc#
    1111666).
  o brcmfmac: reduce timeout for action frame scan (bsc#1051510).
  o brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).
  o brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).
  o brcmsmac: never log "tid x is not agg'able" by default (bsc#1051510).
  o can: c_can: c_can_poll(): only read status register after status IRQ
    (git-fixes).
  o can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).
  o can: mcba_usb: fix use-after-free on disconnect (git-fixes).
  o can: peak_usb: fix a potential out-of-sync while decoding packets
    (git-fixes).
  o can: peak_usb: fix slab info leak (git-fixes).
  o can: rx-offload: can_rx_offload_offload_one(): do not increase the
    skb_queue beyond skb_queue_len_max (git-fixes).
  o can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid
    skb mem leak (git-fixes).
  o can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb
    mem leak (git-fixes).
  o can: usb_8dev: fix use-after-free on disconnect (git-fixes).
  o ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).
  o ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#
    1157184).
  o ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).
  o ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).
  o cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#
    1051510).
  o cfg80211: Prevent regulatory restore during STA disconnect in concurrent
    interfaces (bsc#1051510).
  o cfg80211: call disconnect_wk when AP stops (bsc#1051510).
  o cfg80211: validate wmm rule when setting (bsc#1111666).
  o cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is
    dead (bsc#1158645).
  o cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#
    1144333, bsc#1154355).
  o cifs: Fix missed free operations (bsc#1144333, bsc#1154355).
  o cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).
  o cifs: add a helper to find an existing readable handle to a file (bsc#
    1144333, bsc#1154355).
  o cifs: create a helper to find a writeable handle by path name (bsc#1144333,
    bsc#1154355).
  o cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#
    1154355).
  o cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#
    1154355).
  o cifs: set domainName when a domain-key is used in multiuser (bsc#1144333,
    bsc#1154355).
  o cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic
    (bsc#1144333, bsc#1154355).
  o cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#
    1144333, bsc#1154355).
  o clk: at91: avoid sleeping early (git-fixes).
  o clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).
  o clk: samsung: Use clk_hw API for calling clk framework from clk notifiers
    (bsc#1051510).
  o clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/
    resume (bsc#1051510).
  o clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume
    (git-fixes).
  o clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).
  o clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#
    1051510).
  o clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).
  o compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).
  o component: fix loop condition to call unbind() if bind() fails (bsc#
    1051510).
  o cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).
  o cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).
  o cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).
  o cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#
    1051510).
  o cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).
  o cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).
  o cpupower : frequency-set -r option misses the last cpu in related cpu list
    (bsc#1051510).
  o cpupower: Fix coredump on VMWare (bsc#1051510).
  o crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).
  o crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).
  o crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).
  o crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).
  o crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).
  o crypto: mxs-dcp - Fix AES issues (bsc#1051510).
  o crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).
  o crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash'
    static (bsc#1051510).
  o crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).
  o crypto: tgr192 - remove unneeded semicolon (bsc#1051510).
  o cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).
  o cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).
  o cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#
    1127371).
  o dccp: do not leak jiffies on the wire (networking-stable-19_11_05).
  o dlm: do not leak kernel pointer to userspace (bsc#1051510).
  o dlm: fix invalid free (bsc#1051510).
  o dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#
    1051510).
  o dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).
  o dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).
  o dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#
    1051510).
  o dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).
  o dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).
  o dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).
  o dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).
  o docs: move protection-keys.rst to the core-api book (bsc#1078248).
  o drm/amd/display: fix odm combine pipe reset (bsc#1111666).
  o drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#
    1113956)
  o drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).
  o drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).
  o drm/amdgpu: fix memory leak (bsc#1111666).
  o drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)
  o drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)
  o drm/i915/cmdparser: Ignore Length operands during command matching (bsc#
    1135967)
  o drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)
  o drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).
  o drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)
  o drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)
  o drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)
  o drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)
  o drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).
  o drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#
    1111666).
  o drm/i915/pmu: "Frequency" is reported as accumulated cycles (bsc#1112178)
  o drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)
  o drm/i915: Add support for mandatory cmdparsing (bsc#1135967)
  o drm/i915: Allow parsing of unsized batches (bsc#1135967)
  o drm/i915: Disable Secure Batches for gen6+
  o drm/i915: Do not dereference request if it may have been retired when (bsc#
    1142635)
  o drm/i915: Fix and improve MCR selection logic (bsc#1112178)
  o drm/i915: Lock the engine while dumping the active request (bsc#1142635)
  o drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)
  o drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#
    1135967)
  o drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#
    1129770)
  o drm/i915: Remove Master tables from cmdparser
  o drm/i915: Rename gen7 cmdparser tables (bsc#1135967)
  o drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).
  o drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)
  o drm/msm/dpu: handle failures while initializing displays (bsc#1111666).
  o drm/msm: fix memleak on release (bsc#1111666).
  o drm/omap: fix max fclk divider for omap36xx (bsc#1113722)
  o drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).
  o drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)
  o drm: fix module name in edid_firmware log message (bsc#1113956)
  o e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).
  o e1000e: Use dev_get_drvdata where possible (bsc#1158049).
  o e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm
    (bsc#1158049).
  o ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#
    1158646).
  o ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either
    (bsc#1158647).
  o ext4: fix punch hole for inline_data file systems (bsc#1158640).
  o ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).
  o extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).
  o fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).
  o fbdev: sbuslib: use checked version of put_user() (bsc#1051510).
  o fix SCTP regression (bsc#1158082)
  o ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).
  o gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#
    1051510).
  o gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).
  o gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist
    (bsc#1051510).
  o gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).
  o hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).
  o hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).
  o hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).
  o hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled
    (bsc#1051510).
  o hypfs: Fix error number left in struct pointer member (bsc#1051510).
  o i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)
  o i40e: enable X710 support (bsc#1151067).
  o ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
  o ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
  o ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
  o ibmvnic: Terminate waiting device threads after loss of service (bsc#
    1155689 ltc#182047).
  o ice: fix potential infinite loop because loop counter being too small (bsc#
    1118661).
  o iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).
  o iio: adc: stm32-adc: fix stopping dma (git-fixes).
  o iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).
  o iio: imu: adis16480: assign bias value only if operation succeeded
    (git-fixes).
  o iio: imu: adis16480: make sure provided frequency is positive (git-fixes).
  o iio: imu: adis: assign read val in debugfs hook only if op successful
    (git-fixes).
  o iio: imu: adis: assign value only if return code zero in read funcs
    (git-fixes).
  o include/linux/bitrev.h: fix constant bitrev (bsc#1114279).
  o inet: stop leaking jiffies on the wire (networking-stable-19_11_05).
  o intel_th: Fix a double put_device() in error path (git-fixes).
  o iomap: Fix pipe page leakage during splicing (bsc#1158651).
  o iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#
    1158063).
  o ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#
    1051510).
  o ipv4: Return -ENETUNREACH if we can't create route but saddr is valid
    (networking-stable-19_10_24).
  o irqdomain: Add the missing assignment of domain->fwnode for named fwnode
    (bsc#1111666).
  o iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).
  o iwlwifi: check kasprintf() return value (bsc#1051510).
  o iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).
  o iwlwifi: drop packets with bad status in CD (bsc#1111666).
  o iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).
  o iwlwifi: exclude GEO SAR support for 3168 (git-fixes).
  o iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#
    1111666).
  o iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).
  o iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).
  o iwlwifi: mvm: use correct FIFO length (bsc#1111666).
  o iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).
  o iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).
  o ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).
  o ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).
  o kABI fixup alloc_dax_region (bsc#1158071).
  o kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).
  o kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).
  o kABI workaround for drm_vma_offset_node readonly field addition (bsc#
    1135967)
  o kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).
  o kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).
  o kABI: Fix for "KVM: x86: Introduce vcpu->arch.xsaves_enabled" (bsc#
    1158066).
  o kabi protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)
  o kabi: s390: struct subchannel (git-fixes).
  o lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).
  o lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).
  o libnvdimm: Export the target_node attribute for regions and namespaces (bsc
    #1158071).
  o liquidio: fix race condition in instruction completion processing (bsc#
    1051510).
  o livepatch: Allow to distinguish different version of system state changes
    (bsc#1071995).
  o livepatch: Basic API to track system state changes (bsc#1071995 ).
  o livepatch: Keep replaced patches until post_patch callback is called (bsc#
    1071995).
  o livepatch: Selftests of the API for tracking system state changes (bsc#
    1071995).
  o loop: add ioctl for changing logical block size (bsc#1108043).
  o loop: fix no-unmap write-zeroes request behavior (bsc#1158637).
  o lpfc: size cpu map by last cpu id set (bsc#1157160).
  o mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#
    1051510).
  o mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).
  o mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).
  o mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#
    1051510).
  o macvlan: schedule bc_work even if error (bsc#1051510).
  o mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone
    (git-fixes).
  o media: au0828: Fix incorrect error messages (bsc#1051510).
  o media: bdisp: fix memleak on release (git-fixes).
  o media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).
  o media: davinci: Fix implicit enum conversion warning (bsc#1051510).
  o media: exynos4-is: Fix recursive locking in isp_video_release()
    (git-fixes).
  o media: fix: media: pci: meye: validate offset to avoid arbitrary access
    (bsc#1051510).
  o media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).
  o media: imon: invalid dereference in imon_touch_event (bsc#1051510).
  o media: isif: fix a NULL pointer dereference bug (bsc#1051510).
  o media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc
    #1051510).
  o media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).
  o media: radio: wl1273: fix interrupt masking on release (git-fixes).
  o media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).
  o media: usbvision: Fix races among open, close, and disconnect (bsc#
    1051510).
  o media: vim2m: Fix abort issue (git-fixes).
  o media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#
    1051510).
  o mei: fix modalias documentation (git-fixes).
  o mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).
  o mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#
    1051510).
  o mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).
  o mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).
  o mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).
  o mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable
    (bsc#1051510).
  o mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)
  o mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions
    (bsc#1112374).
  o mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
    (git fixes (mm/gup)).
  o mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new
    zone (git fixes (mm/compaction)).
  o mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).
  o mmc: core: fix wl1251 sdio quirks (git-fixes).
  o mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of
    pandora_wl1251_init_card (git-fixes).
  o mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail
    (bsc#1051510).
  o mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).
  o mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).
  o mmc: sdio: fix wl1251 vendor id (git-fixes).
  o mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).
  o mt76x0: init hw capabilities.
  o mtd: nand: mtk: fix incorrect register setting order about ecc irq.
  o mtd: spear_smi: Fix Write Burst mode (bsc#1051510).
  o mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).
  o mwifex: free rx_cmd skb in suspended state (bsc#1111666).
  o mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).
  o mwifiex: do no submit URB in suspended state (bsc#1111666).
  o nbd: prevent memory leak (bsc#1158638).
  o net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc
    #1089644, ltc#166495, ltc#165544, git-fixes).
  o net/mlx4_core: Dynamically set guaranteed amount of counters per VF
    (networking-stable-19_11_05).
  o net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).
  o net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).
  o net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).
  o net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget
    (networking-stable-19_11_05).
  o net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#
    1103990).
  o net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).
  o net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc
    #1109837).
  o net/smc: Fix error path in smc_init (git-fixes).
  o net/smc: avoid fallback in case of non-blocking connect (git-fixes).
  o net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).
  o net/smc: fix SMCD link group creation with VLAN id (git-fixes).
  o net/smc: fix closing of fallback SMC sockets (git-fixes).
  o net/smc: fix ethernet interface refcounting (git-fixes).
  o net/smc: fix fastopen for non-blocking connect() (git-fixes).
  o net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).
  o net/smc: fix refcounting for non-blocking connect() (git-fixes).
  o net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).
  o net/smc: original socket family in inet_sock_diag (git-fixes).
  o net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()
    (networking-stable-19_11_05).
  o net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
    (networking-stable-19_11_05).
  o net: add skb_queue_empty_lockless() (networking-stable-19_11_05).
  o net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).
  o net: annotate lockless accesses to sk->sk_napi_id
    (networking-stable-19_11_05).
  o net: avoid potential infinite loop in tc_ctl_action()
    (networking-stable-19_10_24).
  o net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3
    (networking-stable-19_10_24).
  o net: bcmgenet: Set phydev->dev_flags only for internal PHYs
    (networking-stable-19_10_24).
  o net: bcmgenet: reset 40nm EPHY on energy detect
    (networking-stable-19_11_05).
  o net: dsa: b53: Do not clear existing mirrored port mask
    (networking-stable-19_11_05).
  o net: dsa: bcm_sf2: Fix IMP setup for port different than 8
    (networking-stable-19_11_05).
  o net: dsa: fix switch tree list (networking-stable-19_11_05).
  o net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum
    (networking-stable-19_11_05).
  o net: fix sk_page_frag() recursion from memory reclaim
    (networking-stable-19_11_05).
  o net: hisilicon: Fix ping latency when deal with high throughput
    (networking-stable-19_11_05).
  o net: hns3: change GFP flag during lock period (bsc#1104353 ).
  o net: hns3: do not query unsupported commands in debugfs (bsc#1104353).
  o net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).
  o net: hns3: fix some reset handshake issue (bsc#1104353 ).
  o net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).
  o net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#
    1104353).
  o net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).
  o net: phylink: Fix flow control resolution (bsc#1119113 ).
  o net: sched: cbs: Avoid division by zero when calculating the port rate (bsc
    #1109837).
  o net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).
  o net: sched: fix reordering issues (bsc#1109837).
  o net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).
  o net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow
    (networking-stable-19_10_24).
  o net: use skb_queue_empty_lockless() in busy poll contexts
    (networking-stable-19_11_05).
  o net: use skb_queue_empty_lockless() in poll() handlers
    (networking-stable-19_11_05).
  o net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions
    (git-fixes).
  o net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition
    (git-fixes).
  o netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).
  o nfc: netlink: fix double device reference drop (git-fixes).
  o nfc: port100: handle command failure cleanly (git-fixes).
  o nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).
  o nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#
    1109837).
  o nl80211: Fix a GET_KEY reply attribute (bsc#1051510).
  o nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).
  o ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).
  o ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).
  o openvswitch: fix flow command message size (git-fixes).
  o padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
    (git-fixes).
  o perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#
    1142924).
  o phy: phy-twl4030-usb: fix denied runtime access (git-fixes).
  o phylink: fix kernel-doc warnings (bsc#1111666).
  o pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args
    call (git-fixes).
  o pinctrl: at91: do not use the same irqchip with multiple gpiochips
    (git-fixes).
  o pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).
  o pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).
  o pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#
    1051510).
  o pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).
  o pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup
    controller init (bsc#1051510).
  o pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup
    controller init (bsc#1051510).
  o pinctrl: samsung: Fix device node refcount leaks in init code (bsc#
    1051510).
  o pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#
    1051510).
  o pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#
    1051510).
  o power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc
    #1051510).
  o power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#
    1051510).
  o power: supply: max14656: fix potential use-after-free (bsc#1051510).
  o power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc
    #1051510).
  o power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#
    1051510).
  o powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
  o powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary
    is full (bsc#1157778 ltc#182520).
  o powerpc/bpf: Fix tail call implementation (bsc#1157698).
  o powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc
    #1157778 ltc#182520).
  o powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).
  o powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#
    1156700 ltc#182459).
  o powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#
    182459).
  o powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
  o powerpc/security: Fix wrong message when RFI Flush is disable (bsc#
    1131107).
  o powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#
    1156882 ltc#182435).
  o ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).
  o printk: Export console_printk (bsc#1071995).
  o pwm: bcm-iproc: Prevent unloading the driver module while in use
    (git-fixes).
  o pwm: lpss: Only set update bit if we are actually changing the settings
    (bsc#1051510).
  o qxl: fix null-pointer crash during suspend (bsc#1111666).
  o r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2
    (networking-stable-19_11_05).
  o regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).
  o regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#
    1051510).
  o remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).
  o reset: Fix potential use-after-free in __of_reset_control_get() (bsc#
    1051510).
  o reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).
  o reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).
  o rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let
    COMPRESS_VMLINUX determine the compression used for vmlinux. By default
    (historically), it is gz.
  o rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)
  o rt2800: remove errornous duplicate condition (git-fixes).
  o rtl8187: Fix warning generated when strncpy() destination length matches
    the sixe argument (bsc#1051510).
  o rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).
  o rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface (bsc#
    1111666).
  o rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).
  o rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#
    1051510).
  o rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).
  o s390/bpf: fix lcgr instruction encoding (bsc#1051510).
  o s390/bpf: use 32-bit index for tail calls (bsc#1051510).
  o s390/cio: avoid calling strlen on null pointer (bsc#1051510).
  o s390/cio: exclude subchannels with no parent from pseudo check (bsc#
    1051510).
  o s390/cio: fix virtio-ccw DMA without PV (git-fixes).
  o s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).
  o s390/idle: fix cpu idle time calculation (bsc#1051510).
  o s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#
    1051510).
  o s390/process: avoid potential reading of freed stack (bsc#1051510).
  o s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).
  o s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#
    1051510).
  o s390/qeth: return proper errno on IO error (bsc#1051510).
  o s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#
    1140948).
  o s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).
  o s390/topology: avoid firing events before kobjs are created (bsc#1051510).
  o s390/zcrypt: fix memleak at release (git-fixes).
  o s390: fix stfle zero padding (bsc#1051510).
  o s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).
  o sc16is7xx: Fix for "Unexpected interrupt: 8" (bsc#1051510).
  o scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).
  o scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).
  o scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).
  o scsi: lpfc: Clarify FAWNN error message (bsc#1154601).
  o scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#
    1154601).
  o scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#
    1151900).
  o scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#
    1154601).
  o scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#
    1154601).
  o scsi: lpfc: Fix configuration of BB credit recovery in service parameters
    (bsc#1154601).
  o scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#
    1154601).
  o scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).
  o scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port
    bounce (bsc#1154601).
  o scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).
  o scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#
    1154601).
  o scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).
  o scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).
  o scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).
  o scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).
  o scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).
  o scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).
  o scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#
    1154601).
  o scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#
    1154601).
  o scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).
  o scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).
  o scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#
    1154601).
  o scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).
  o scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).
  o scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences
    (bsc#1154601).
  o scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer
    dereferences (bsc#1154601).
  o scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).
  o scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#
    1154601).
  o scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).
  o scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).
  o scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424,
    bsc#1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#
    1117169, bsc#1151548).
  o scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908.
    bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc
    #1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#
    1154526 bsc#1048942).
  o scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706
    bsc#1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635
    bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526
    bsc#1048942).
  o scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424,
    bsc#1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#
    1157908. bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#
    1154526 bsc#1048942).
  o scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635
    bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908.
    bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: Use correct number of vectors for online CPUs (bsc#1137223).
  o scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908.
    bsc#1117169, bsc#1151548).
  o scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#
    1082635 bsc#1154526 bsc#1048942).
  o scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#
    1138039).
  o scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#
    1154526 bsc#1048942).
  o scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).
  o scsi: sd: Ignore a failure to sync cache due to lack of authorization
    (git-fixes).
  o scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).
  o scsi: zfcp: fix request object use-after-free in send path causing wrong
    traces (bsc#1051510).
  o sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).
  o selftests: net: reuseport_dualstack: fix uninitalized parameter
    (networking-stable-19_11_05).
  o serial: fix kernel-doc warning in comments (bsc#1051510).
  o serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).
  o serial: mxs-auart: Fix potential infinite loop (bsc#1051510).
  o serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#
    1051510).
  o serial: uartlite: fix exit path null pointer (bsc#1051510).
  o serial: uartps: Fix suspend functionality (bsc#1051510).
  o signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).
  o slcan: Fix memory leak in error path (bsc#1051510).
  o slip: Fix memory leak in slip_open error path (bsc#1051510).
  o slip: Fix use-after-free Read in slip_open (bsc#1051510).
  o smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#
    1154355).
  o smb3: fix leak in "open on server" perf counter (bsc#1144333, bsc#1154355).
  o smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).
  o smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).
  o smb3: improve handling of share deleted (and share recreated) (bsc#1144333,
    bsc#1154355).
  o soc: imx: gpc: fix PDN delay (bsc#1051510).
  o soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).
  o spi: atmel: Fix CS high support (bsc#1051510).
  o spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).
  o spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).
  o spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).
  o spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#
    1051510).
  o spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).
  o spi: rockchip: initialize dma_slave_config properly (bsc#1051510).
  o spi: spidev: Fix OF tree warning logic (bsc#1051510).
  o staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).
  o supported.conf:
  o synclink_gt(): fix compat_ioctl() (bsc#1051510).
  o tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).
  o thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).
  o tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).
  o tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
    (bsc#1051510).
  o tipc: check link name with right length in tipc_nl_compat_link_set (bsc#
    1051510).
  o tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#
    1051510).
  o tipc: compat: allow tipc commands without arguments (bsc#1051510).
  o tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#
    1051510).
  o tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).
  o tipc: handle the err returned from cmd header function (bsc#1051510).
  o tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).
  o tipc: tipc clang warning (bsc#1051510).
  o tools/power/x86/intel-speed-select: Fix a read overflow in
    isst_set_tdp_level_msr() (bsc#1111666).
  o tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).
  o tpm: add check after commands attribs tab allocation (bsc#1051510).
  o tracing: Get trace_array reference for available_tracers files (bsc#
    1156429).
  o tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).
  o tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).
  o tty: serial: msm_serial: Fix flow control (bsc#1051510).
  o tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).
  o tun: fix data-race in gro_normal_list() (bsc#1111666).
  o ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).
  o ubifs: Limit the number of pages in shrink_liability (bsc#1158643).
  o udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).
  o usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).
  o usb-storage: Revert commit 747668dbc061 ("usb-storage: Set
    virt_boundary_mask to avoid SG overflows") (bsc#1051510).
  o usb: chipidea: Fix otg event handler (bsc#1051510).
  o usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already
    started (bsc#1051510).
  o usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).
  o usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).
  o usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in
    fotg210_get_status() (bsc#1051510).
  o usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).
  o usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#
    1051510).
  o usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#
    1051510).
  o usb: gadget: uvc: configfs: Prevent format changes after linking header
    (bsc#1051510).
  o usb: handle warm-reset port requests on hub resume (bsc#1051510).
  o usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).
  o usbip: Fix free of unallocated memory in vhci tx (git-fixes).
  o usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path
    (git-fixes).
  o usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).
  o usbip: tools: fix fd leakage in the function of read_attr_usbip_status
    (git-fixes).
  o vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).
  o vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#
    1051510).
  o vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).
  o video/hdmi: Fix AVI bar unpack (git-fixes).
  o virtio/s390: fix race on airq_areas (bsc#1051510).
  o virtio_console: allocate inbufs in add_port() only if it is needed
    (git-fixes).
  o virtio_ring: fix return code on DMA mapping fails (git-fixes).
  o vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).
  o vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).
  o watchdog: meson: Fix the wrong value of left time (bsc#1051510).
  o wil6210: drop Rx multicast packets that are looped-back to STA (bsc#
    1111666).
  o wil6210: fix L2 RX status handling (bsc#1111666).
  o wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).
  o wil6210: fix debugfs memory access alignment (bsc#1111666).
  o wil6210: fix freeing of rx buffers in EDMA mode (bsc#1111666).
  o wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).
  o wil6210: fix locking in wmi_call (bsc#1111666).
  o wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).
  o wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).
  o x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
  o x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#
    1153811).
  o x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#
    1078248).
  o x86/pkeys: Update documentation about availability (bsc#1078248).
  o x86/resctrl: Fix potential lockdep warning (bsc#1114279).
  o x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#
    1114279).
  o x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#
    1158068).
  o xfrm: Fix xfrm sel prefix length validation (git-fixes).
  o xfrm: fix sa selector validation (bsc#1156609).
  o xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).
  o xsk: Fix registration of Rx-only sockets (bsc#1109837).
  o xsk: relax UMEM headroom alignment (bsc#1109837).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Public Cloud 15-SP1:
    zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3372=1

Package List:

  o SUSE Linux Enterprise Module for Public Cloud 15-SP1 (x86_64):
       kernel-azure-4.12.14-8.22.1
       kernel-azure-base-4.12.14-8.22.1
       kernel-azure-base-debuginfo-4.12.14-8.22.1
       kernel-azure-debuginfo-4.12.14-8.22.1
       kernel-azure-devel-4.12.14-8.22.1
       kernel-syms-azure-4.12.14-8.22.1
  o SUSE Linux Enterprise Module for Public Cloud 15-SP1 (noarch):
       kernel-devel-azure-4.12.14-8.22.1
       kernel-source-azure-4.12.14-8.22.1


References:

  o https://www.suse.com/security/cve/CVE-2019-0154.html
  o https://www.suse.com/security/cve/CVE-2019-14895.html
  o https://www.suse.com/security/cve/CVE-2019-14901.html
  o https://www.suse.com/security/cve/CVE-2019-15213.html
  o https://www.suse.com/security/cve/CVE-2019-15916.html
  o https://www.suse.com/security/cve/CVE-2019-16231.html
  o https://www.suse.com/security/cve/CVE-2019-17055.html
  o https://www.suse.com/security/cve/CVE-2019-18660.html
  o https://www.suse.com/security/cve/CVE-2019-18683.html
  o https://www.suse.com/security/cve/CVE-2019-18805.html
  o https://www.suse.com/security/cve/CVE-2019-18809.html
  o https://www.suse.com/security/cve/CVE-2019-19046.html
  o https://www.suse.com/security/cve/CVE-2019-19049.html
  o https://www.suse.com/security/cve/CVE-2019-19052.html
  o https://www.suse.com/security/cve/CVE-2019-19056.html
  o https://www.suse.com/security/cve/CVE-2019-19057.html
  o https://www.suse.com/security/cve/CVE-2019-19058.html
  o https://www.suse.com/security/cve/CVE-2019-19060.html
  o https://www.suse.com/security/cve/CVE-2019-19062.html
  o https://www.suse.com/security/cve/CVE-2019-19063.html
  o https://www.suse.com/security/cve/CVE-2019-19065.html
  o https://www.suse.com/security/cve/CVE-2019-19067.html
  o https://www.suse.com/security/cve/CVE-2019-19068.html
  o https://www.suse.com/security/cve/CVE-2019-19073.html
  o https://www.suse.com/security/cve/CVE-2019-19074.html
  o https://www.suse.com/security/cve/CVE-2019-19075.html
  o https://www.suse.com/security/cve/CVE-2019-19077.html
  o https://www.suse.com/security/cve/CVE-2019-19078.html
  o https://www.suse.com/security/cve/CVE-2019-19080.html
  o https://www.suse.com/security/cve/CVE-2019-19081.html
  o https://www.suse.com/security/cve/CVE-2019-19082.html
  o https://www.suse.com/security/cve/CVE-2019-19083.html
  o https://www.suse.com/security/cve/CVE-2019-19227.html
  o https://www.suse.com/security/cve/CVE-2019-19524.html
  o https://www.suse.com/security/cve/CVE-2019-19525.html
  o https://www.suse.com/security/cve/CVE-2019-19528.html
  o https://www.suse.com/security/cve/CVE-2019-19529.html
  o https://www.suse.com/security/cve/CVE-2019-19530.html
  o https://www.suse.com/security/cve/CVE-2019-19531.html
  o https://www.suse.com/security/cve/CVE-2019-19534.html
  o https://www.suse.com/security/cve/CVE-2019-19536.html
  o https://www.suse.com/security/cve/CVE-2019-19543.html
  o https://bugzilla.suse.com/1048942
  o https://bugzilla.suse.com/1051510
  o https://bugzilla.suse.com/1071995
  o https://bugzilla.suse.com/1078248
  o https://bugzilla.suse.com/1082635
  o https://bugzilla.suse.com/1089644
  o https://bugzilla.suse.com/1091041
  o https://bugzilla.suse.com/1103990
  o https://bugzilla.suse.com/1103991
  o https://bugzilla.suse.com/1104353
  o https://bugzilla.suse.com/1104427
  o https://bugzilla.suse.com/1104745
  o https://bugzilla.suse.com/1108043
  o https://bugzilla.suse.com/1109837
  o https://bugzilla.suse.com/1111666
  o https://bugzilla.suse.com/1112178
  o https://bugzilla.suse.com/1112374
  o https://bugzilla.suse.com/1113722
  o https://bugzilla.suse.com/1113956
  o https://bugzilla.suse.com/1113994
  o https://bugzilla.suse.com/1114279
  o https://bugzilla.suse.com/1117169
  o https://bugzilla.suse.com/1118661
  o https://bugzilla.suse.com/1119113
  o https://bugzilla.suse.com/1120853
  o https://bugzilla.suse.com/1126390
  o https://bugzilla.suse.com/1127354
  o https://bugzilla.suse.com/1127371
  o https://bugzilla.suse.com/1129770
  o https://bugzilla.suse.com/1131107
  o https://bugzilla.suse.com/1134983
  o https://bugzilla.suse.com/1135966
  o https://bugzilla.suse.com/1135967
  o https://bugzilla.suse.com/1137223
  o https://bugzilla.suse.com/1137236
  o https://bugzilla.suse.com/1138039
  o https://bugzilla.suse.com/1140948
  o https://bugzilla.suse.com/1142095
  o https://bugzilla.suse.com/1142635
  o https://bugzilla.suse.com/1142924
  o https://bugzilla.suse.com/1143706
  o https://bugzilla.suse.com/1144333
  o https://bugzilla.suse.com/1146544
  o https://bugzilla.suse.com/1149448
  o https://bugzilla.suse.com/1150466
  o https://bugzilla.suse.com/1151067
  o https://bugzilla.suse.com/1151548
  o https://bugzilla.suse.com/1151900
  o https://bugzilla.suse.com/1152782
  o https://bugzilla.suse.com/1153628
  o https://bugzilla.suse.com/1153811
  o https://bugzilla.suse.com/1154043
  o https://bugzilla.suse.com/1154058
  o https://bugzilla.suse.com/1154124
  o https://bugzilla.suse.com/1154355
  o https://bugzilla.suse.com/1154526
  o https://bugzilla.suse.com/1154601
  o https://bugzilla.suse.com/1155021
  o https://bugzilla.suse.com/1155689
  o https://bugzilla.suse.com/1155692
  o https://bugzilla.suse.com/1155836
  o https://bugzilla.suse.com/1155897
  o https://bugzilla.suse.com/1155921
  o https://bugzilla.suse.com/1156187
  o https://bugzilla.suse.com/1156258
  o https://bugzilla.suse.com/1156429
  o https://bugzilla.suse.com/1156466
  o https://bugzilla.suse.com/1156471
  o https://bugzilla.suse.com/1156494
  o https://bugzilla.suse.com/1156609
  o https://bugzilla.suse.com/1156700
  o https://bugzilla.suse.com/1156729
  o https://bugzilla.suse.com/1156882
  o https://bugzilla.suse.com/1156928
  o https://bugzilla.suse.com/1157032
  o https://bugzilla.suse.com/1157038
  o https://bugzilla.suse.com/1157042
  o https://bugzilla.suse.com/1157044
  o https://bugzilla.suse.com/1157045
  o https://bugzilla.suse.com/1157046
  o https://bugzilla.suse.com/1157049
  o https://bugzilla.suse.com/1157070
  o https://bugzilla.suse.com/1157115
  o https://bugzilla.suse.com/1157143
  o https://bugzilla.suse.com/1157145
  o https://bugzilla.suse.com/1157158
  o https://bugzilla.suse.com/1157160
  o https://bugzilla.suse.com/1157162
  o https://bugzilla.suse.com/1157171
  o https://bugzilla.suse.com/1157173
  o https://bugzilla.suse.com/1157178
  o https://bugzilla.suse.com/1157180
  o https://bugzilla.suse.com/1157182
  o https://bugzilla.suse.com/1157183
  o https://bugzilla.suse.com/1157184
  o https://bugzilla.suse.com/1157191
  o https://bugzilla.suse.com/1157193
  o https://bugzilla.suse.com/1157197
  o https://bugzilla.suse.com/1157298
  o https://bugzilla.suse.com/1157304
  o https://bugzilla.suse.com/1157307
  o https://bugzilla.suse.com/1157324
  o https://bugzilla.suse.com/1157333
  o https://bugzilla.suse.com/1157386
  o https://bugzilla.suse.com/1157424
  o https://bugzilla.suse.com/1157463
  o https://bugzilla.suse.com/1157499
  o https://bugzilla.suse.com/1157678
  o https://bugzilla.suse.com/1157698
  o https://bugzilla.suse.com/1157778
  o https://bugzilla.suse.com/1157908
  o https://bugzilla.suse.com/1158049
  o https://bugzilla.suse.com/1158063
  o https://bugzilla.suse.com/1158064
  o https://bugzilla.suse.com/1158065
  o https://bugzilla.suse.com/1158066
  o https://bugzilla.suse.com/1158067
  o https://bugzilla.suse.com/1158068
  o https://bugzilla.suse.com/1158071
  o https://bugzilla.suse.com/1158082
  o https://bugzilla.suse.com/1158381
  o https://bugzilla.suse.com/1158394
  o https://bugzilla.suse.com/1158398
  o https://bugzilla.suse.com/1158407
  o https://bugzilla.suse.com/1158410
  o https://bugzilla.suse.com/1158413
  o https://bugzilla.suse.com/1158417
  o https://bugzilla.suse.com/1158427
  o https://bugzilla.suse.com/1158445
  o https://bugzilla.suse.com/1158637
  o https://bugzilla.suse.com/1158638
  o https://bugzilla.suse.com/1158639
  o https://bugzilla.suse.com/1158640
  o https://bugzilla.suse.com/1158641
  o https://bugzilla.suse.com/1158643
  o https://bugzilla.suse.com/1158644
  o https://bugzilla.suse.com/1158645
  o https://bugzilla.suse.com/1158646
  o https://bugzilla.suse.com/1158647
  o https://bugzilla.suse.com/1158649
  o https://bugzilla.suse.com/1158651
  o https://bugzilla.suse.com/1158652

===============================================================================

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2019:3379-1
Rating:            important
References:        #1091041 #1119461 #1119465 #1131107 #1138190 #1146544
                   #1146612 #1150466 #1150483 #1152631 #1153811 #1154905
                   #1155689 #1155897 #1155898 #1156187 #1157038 #1157042
                   #1157070 #1157143 #1157158 #1157191 #1157324 #1157333
                   #1157464 #1158132 #1158394 #1158398 #1158410 #1158413
                   #1158417 #1158445 #1158823 #1158824 #1158827 #1158834
                   #1158900 #1158903 #1158904 #1158954
Cross-References:  CVE-2019-14895 CVE-2019-15213 CVE-2019-16231 CVE-2019-18660
                   CVE-2019-18680 CVE-2019-18683 CVE-2019-18805 CVE-2019-19052
                   CVE-2019-19062 CVE-2019-19065 CVE-2019-19073 CVE-2019-19074
                   CVE-2019-19332 CVE-2019-19338 CVE-2019-19523 CVE-2019-19524
                   CVE-2019-19525 CVE-2019-19527 CVE-2019-19530 CVE-2019-19531
                   CVE-2019-19532 CVE-2019-19533 CVE-2019-19534 CVE-2019-19535
                   CVE-2019-19536 CVE-2019-19537
Affected Products:
                   SUSE OpenStack Cloud Crowbar 8
                   SUSE OpenStack Cloud 8
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP3-BCL
                   SUSE Linux Enterprise High Availability 12-SP3
                   SUSE Enterprise Storage 5
                   SUSE CaaS Platform 3.0
                   HPE Helion Openstack 8
______________________________________________________________________________

An update that solves 26 vulnerabilities and has 14 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP 3 LTSS kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  o CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux
    kernel in Marvell WiFi chip driver. The flaw could occur when the station
    attempts a connection negotiation during the handling of the remote devices
    country settings. This could have allowed the remote device to cause a
    denial of service (system crash) or possibly execute arbitrary code (bnc#
    1157158).
  o CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure
    because the Spectre-RSB mitigation is not in place for all applicable CPUs.
    This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/
    security.c (bnc#1157038).
  o CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in
    the Linux kernel. It is exploitable for privilege escalation on some Linux
    distributions where local users have /dev/video0 access, but only if the
    driver happens to be loaded. There are multiple race conditions during
    streaming stopping in this driver (part of the V4L2 subsystem). These
    issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap
    (), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the
    corresponding kthreads. At least one of these race conditions leads to a
    use-after-free (bnc#1155897).
  o CVE-2019-19062: A memory leak in the crypto_report() function in crypto/
    crypto_user_base.c in the Linux kernel allowed attackers to cause a denial
    of service (memory consumption) by triggering crypto_report_alg() failures
    (bnc#1157333).
  o CVE-2019-19065: A memory leak in the sdma_init() function in drivers/
    infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a
    denial of service (memory consumption) by triggering rhashtable_init()
    failures (bnc#1157191).
  o CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/
    can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of
    service (memory consumption) by triggering usb_submit_urb() failures (bnc#
    1157324).
  o CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/
    net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause
    a denial of service (memory consumption) (bnc#1157143).
  o CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in
    the Linux kernel allowed attackers to cause a denial of service (memory
    consumption) by triggering wait_for_completion_timeout() failures. This
    affects the htc_config_pipe_credits() function, the htc_setup_complete()
    function, and the htc_connect_service() function (bnc#1157070).
  o CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did
    not check the alloc_workqueue return value, leading to a NULL pointer
    dereference (bnc#1150466).
  o CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in
    the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow
    in tcp_ack_update_rtt() when userspace writes a very large integer to /proc
    /sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly
    unspecified other impact (bnc#1156187).
  o CVE-2019-18680: An issue was discovered in the Linux kernel. There was a
    NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will
    cause denial of service (bnc#1155898).
  o CVE-2019-15213: An use-after-free was fixed caused by malicious USB device
    in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).
  o CVE-2019-19536: An uninitialized Kernel memory can leak to USB devices in
    drivers/net/can/usb/peak_usb/pcan_usb_pro.c (bsc#1158394).
  o CVE-2019-19534: An uninitialized Kernel memory can leak to USB devices in
    drivers/net/can/usb/peak_usb/pcan_usb_core.c (bsc#1158398).
  o CVE-2019-19530: An use-after-free bug that can be caused by a malicious USB
    device in the drivers/usb/class/cdc-acm.c driver (bsc#1158410).
  o CVE-2019-19524: An use-after-free bug that can be caused by a malicious USB
    device in the drivers/input/ff-memless.c driver (bsc#1158413).
  o CVE-2019-19525: An use-after-free bug that can be caused by a malicious USB
    device in the drivers/net/ieee802154/atusb.c driver (bsc#1158417).
  o CVE-2019-19531: An use-after-free in yurex_delete may lead to denial of
    service (bsc#1158445).
  o CVE-2019-19523: An use-after-free on disconnect in USB adutux (bsc#
    1158823).
  o CVE-2019-19532: An out-of-bounds write bugs that can be caused by a
    malicious USB device in the Linux kernel HID drivers (bsc#1158824).
  o CVE-2019-19332: An out-of-bounds memory write via kvm_dev_ioctl_get_cpuid
    (bsc#1158827).
  o CVE-2019-19533: An info-leak bug that can be caused by a malicious USB
    device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bsc#1158834).
  o CVE-2019-19527: An use-after-free bug that can be caused by a malicious USB
    device in the drivers/hid/usbhid/hiddev.c driver (bsc#1158900).
  o CVE-2019-19535: An info-leak bug that can be caused by a malicious USB
    device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bsc#
    1158903).
  o CVE-2019-19537: Two races in the USB character device registration and
    deregistration routines (bsc#1158904).
  o CVE-2019-19338: An incomplete fix for Transaction Asynchronous Abort (TAA)
    (bsc#1158954).

The following non-security bugs were fixed:

  o hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221,
    jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
  o ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
  o ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
  o ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
  o ibmvnic: Terminate waiting device threads after loss of service (bsc#
    1155689 ltc#182047).
  o netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
  o powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
  o powerpc/security: Fix wrong message when RFI Flush is disable (bsc#
    1131107).
  o sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).
  o x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
  o x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#
    1153811).
  o xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
  o arp: Fix cache issue during Life Partition Migration (bsc#1152631).
  o futexes: Fix speed on 4.12 kernel (bsc#1157464).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2019-3379=1
  o SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2019-3379=1
  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2019-3379=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-3379=1
  o SUSE Linux Enterprise Server 12-SP3-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2019-3379=1
  o SUSE Linux Enterprise High Availability 12-SP3:
    zypper in -t patch SUSE-SLE-HA-12-SP3-2019-3379=1
  o SUSE Enterprise Storage 5:
    zypper in -t patch SUSE-Storage-5-2019-3379=1
  o SUSE CaaS Platform 3.0:
    To install this update, use the SUSE CaaS Platform Velum dashboard. It will
    inform you if it detects new updates and let you then trigger updating of
    the complete cluster in a controlled way.
  o HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2019-3379=1

Package List:

  o SUSE OpenStack Cloud Crowbar 8 (x86_64):
       kernel-default-4.4.180-94.113.1
       kernel-default-base-4.4.180-94.113.1
       kernel-default-base-debuginfo-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
       kernel-default-devel-4.4.180-94.113.1
       kernel-default-kgraft-4.4.180-94.113.1
       kernel-syms-4.4.180-94.113.1
       kgraft-patch-4_4_180-94_113-default-1-4.5.1
       kgraft-patch-4_4_180-94_113-default-debuginfo-1-4.5.1
  o SUSE OpenStack Cloud Crowbar 8 (noarch):
       kernel-devel-4.4.180-94.113.1
       kernel-macros-4.4.180-94.113.1
       kernel-source-4.4.180-94.113.1
  o SUSE OpenStack Cloud 8 (x86_64):
       kernel-default-4.4.180-94.113.1
       kernel-default-base-4.4.180-94.113.1
       kernel-default-base-debuginfo-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
       kernel-default-devel-4.4.180-94.113.1
       kernel-default-kgraft-4.4.180-94.113.1
       kernel-syms-4.4.180-94.113.1
       kgraft-patch-4_4_180-94_113-default-1-4.5.1
       kgraft-patch-4_4_180-94_113-default-debuginfo-1-4.5.1
  o SUSE OpenStack Cloud 8 (noarch):
       kernel-devel-4.4.180-94.113.1
       kernel-macros-4.4.180-94.113.1
       kernel-source-4.4.180-94.113.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
       kernel-default-4.4.180-94.113.1
       kernel-default-base-4.4.180-94.113.1
       kernel-default-base-debuginfo-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
       kernel-default-devel-4.4.180-94.113.1
       kernel-default-kgraft-4.4.180-94.113.1
       kernel-syms-4.4.180-94.113.1
       kgraft-patch-4_4_180-94_113-default-1-4.5.1
       kgraft-patch-4_4_180-94_113-default-debuginfo-1-4.5.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):
       kernel-devel-4.4.180-94.113.1
       kernel-macros-4.4.180-94.113.1
       kernel-source-4.4.180-94.113.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
       kernel-default-4.4.180-94.113.1
       kernel-default-base-4.4.180-94.113.1
       kernel-default-base-debuginfo-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
       kernel-default-devel-4.4.180-94.113.1
       kernel-syms-4.4.180-94.113.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):
       kernel-default-kgraft-4.4.180-94.113.1
       kgraft-patch-4_4_180-94_113-default-1-4.5.1
       kgraft-patch-4_4_180-94_113-default-debuginfo-1-4.5.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):
       kernel-devel-4.4.180-94.113.1
       kernel-macros-4.4.180-94.113.1
       kernel-source-4.4.180-94.113.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (s390x):
       kernel-default-man-4.4.180-94.113.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (noarch):
       kernel-devel-4.4.180-94.113.1
       kernel-macros-4.4.180-94.113.1
       kernel-source-4.4.180-94.113.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
       kernel-default-4.4.180-94.113.1
       kernel-default-base-4.4.180-94.113.1
       kernel-default-base-debuginfo-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
       kernel-default-devel-4.4.180-94.113.1
       kernel-syms-4.4.180-94.113.1
  o SUSE Linux Enterprise High Availability 12-SP3 (ppc64le s390x x86_64):
       cluster-md-kmp-default-4.4.180-94.113.1
       cluster-md-kmp-default-debuginfo-4.4.180-94.113.1
       dlm-kmp-default-4.4.180-94.113.1
       dlm-kmp-default-debuginfo-4.4.180-94.113.1
       gfs2-kmp-default-4.4.180-94.113.1
       gfs2-kmp-default-debuginfo-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
       ocfs2-kmp-default-4.4.180-94.113.1
       ocfs2-kmp-default-debuginfo-4.4.180-94.113.1
  o SUSE Enterprise Storage 5 (aarch64 x86_64):
       kernel-default-4.4.180-94.113.1
       kernel-default-base-4.4.180-94.113.1
       kernel-default-base-debuginfo-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
       kernel-default-devel-4.4.180-94.113.1
       kernel-syms-4.4.180-94.113.1
  o SUSE Enterprise Storage 5 (noarch):
       kernel-devel-4.4.180-94.113.1
       kernel-macros-4.4.180-94.113.1
       kernel-source-4.4.180-94.113.1
  o SUSE Enterprise Storage 5 (x86_64):
       kernel-default-kgraft-4.4.180-94.113.1
       kgraft-patch-4_4_180-94_113-default-1-4.5.1
       kgraft-patch-4_4_180-94_113-default-debuginfo-1-4.5.1
  o SUSE CaaS Platform 3.0 (x86_64):
       kernel-default-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
  o HPE Helion Openstack 8 (noarch):
       kernel-devel-4.4.180-94.113.1
       kernel-macros-4.4.180-94.113.1
       kernel-source-4.4.180-94.113.1
  o HPE Helion Openstack 8 (x86_64):
       kernel-default-4.4.180-94.113.1
       kernel-default-base-4.4.180-94.113.1
       kernel-default-base-debuginfo-4.4.180-94.113.1
       kernel-default-debuginfo-4.4.180-94.113.1
       kernel-default-debugsource-4.4.180-94.113.1
       kernel-default-devel-4.4.180-94.113.1
       kernel-default-kgraft-4.4.180-94.113.1
       kernel-syms-4.4.180-94.113.1
       kgraft-patch-4_4_180-94_113-default-1-4.5.1
       kgraft-patch-4_4_180-94_113-default-debuginfo-1-4.5.1


References:

  o https://www.suse.com/security/cve/CVE-2019-14895.html
  o https://www.suse.com/security/cve/CVE-2019-15213.html
  o https://www.suse.com/security/cve/CVE-2019-16231.html
  o https://www.suse.com/security/cve/CVE-2019-18660.html
  o https://www.suse.com/security/cve/CVE-2019-18680.html
  o https://www.suse.com/security/cve/CVE-2019-18683.html
  o https://www.suse.com/security/cve/CVE-2019-18805.html
  o https://www.suse.com/security/cve/CVE-2019-19052.html
  o https://www.suse.com/security/cve/CVE-2019-19062.html
  o https://www.suse.com/security/cve/CVE-2019-19065.html
  o https://www.suse.com/security/cve/CVE-2019-19073.html
  o https://www.suse.com/security/cve/CVE-2019-19074.html
  o https://www.suse.com/security/cve/CVE-2019-19332.html
  o https://www.suse.com/security/cve/CVE-2019-19338.html
  o https://www.suse.com/security/cve/CVE-2019-19523.html
  o https://www.suse.com/security/cve/CVE-2019-19524.html
  o https://www.suse.com/security/cve/CVE-2019-19525.html
  o https://www.suse.com/security/cve/CVE-2019-19527.html
  o https://www.suse.com/security/cve/CVE-2019-19530.html
  o https://www.suse.com/security/cve/CVE-2019-19531.html
  o https://www.suse.com/security/cve/CVE-2019-19532.html
  o https://www.suse.com/security/cve/CVE-2019-19533.html
  o https://www.suse.com/security/cve/CVE-2019-19534.html
  o https://www.suse.com/security/cve/CVE-2019-19535.html
  o https://www.suse.com/security/cve/CVE-2019-19536.html
  o https://www.suse.com/security/cve/CVE-2019-19537.html
  o https://bugzilla.suse.com/1091041
  o https://bugzilla.suse.com/1119461
  o https://bugzilla.suse.com/1119465
  o https://bugzilla.suse.com/1131107
  o https://bugzilla.suse.com/1138190
  o https://bugzilla.suse.com/1146544
  o https://bugzilla.suse.com/1146612
  o https://bugzilla.suse.com/1150466
  o https://bugzilla.suse.com/1150483
  o https://bugzilla.suse.com/1152631
  o https://bugzilla.suse.com/1153811
  o https://bugzilla.suse.com/1154905
  o https://bugzilla.suse.com/1155689
  o https://bugzilla.suse.com/1155897
  o https://bugzilla.suse.com/1155898
  o https://bugzilla.suse.com/1156187
  o https://bugzilla.suse.com/1157038
  o https://bugzilla.suse.com/1157042
  o https://bugzilla.suse.com/1157070
  o https://bugzilla.suse.com/1157143
  o https://bugzilla.suse.com/1157158
  o https://bugzilla.suse.com/1157191
  o https://bugzilla.suse.com/1157324
  o https://bugzilla.suse.com/1157333
  o https://bugzilla.suse.com/1157464
  o https://bugzilla.suse.com/1158132
  o https://bugzilla.suse.com/1158394
  o https://bugzilla.suse.com/1158398
  o https://bugzilla.suse.com/1158410
  o https://bugzilla.suse.com/1158413
  o https://bugzilla.suse.com/1158417
  o https://bugzilla.suse.com/1158445
  o https://bugzilla.suse.com/1158823
  o https://bugzilla.suse.com/1158824
  o https://bugzilla.suse.com/1158827
  o https://bugzilla.suse.com/1158834
  o https://bugzilla.suse.com/1158900
  o https://bugzilla.suse.com/1158903
  o https://bugzilla.suse.com/1158904
  o https://bugzilla.suse.com/1158954

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=TYFR
-----END PGP SIGNATURE-----