Kernel Updates for openSUSE Leap 15
Posted on: 08/17/2019 06:54 AM

Updated Linux Kernels has been released for openSUSE Leap 15.0 and 15.1:

openSUSE-SU-2019:1923-1: important: Security update for the Linux Kernel
openSUSE-SU-2019:1924-1: important: Security update for the Linux Kernel

openSUSE-SU-2019:1923-1: important: Security update for the Linux Kernel
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1923-1
Rating: important
References: #1051510 #1055117 #1071995 #1083647 #1083710
#1085030 #1086103 #1102247 #1103991 #1103992
#1104745 #1106061 #1109837 #1111666 #1112374
#1114279 #1119222 #1123959 #1127034 #1127315
#1127611 #1129770 #1130972 #1131281 #1133021
#1134090 #1134097 #1134390 #1134399 #1135335
#1135642 #1135897 #1136217 #1136342 #1136352
#1136460 #1136461 #1136467 #1136502 #1137458
#1137534 #1137535 #1137584 #1137609 #1137811
#1137827 #1138874 #1139101 #1139358 #1139500
#1139619 #1140133 #1140139 #1140322 #1140426
#1140559 #1140652 #1140676 #1140903 #1140945
#1141312 #1141401 #1141402 #1141450 #1141452
#1141453 #1141454 #1141478 #1141558 #1142023
#1142052 #1142083 #1142112 #1142115 #1142117
#1142118 #1142119 #1142220 #1142221 #1142254
#1142265 #1142350 #1142351 #1142354 #1142359
#1142450 #1142623 #1142635 #1142673 #1142685
#1142701 #1142857 #1142868 #1143003 #1143045
#1143105 #1143185 #1143189 #1143191 #1143209
#1143466 #1143507 #1143738 #1144474 #1144518

Cross-References: CVE-2018-20855 CVE-2019-10207 CVE-2019-1125
CVE-2019-11810 CVE-2019-13631 CVE-2019-13648
CVE-2019-14283 CVE-2019-14284
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that solves 8 vulnerabilities and has 97 fixes is
now available.

Description:



The openSUSE Leap 15.1 kernel was updated to receive various security and
bugfixes.


The following security bugs were fixed:

- CVE-2019-1125: Fix Spectre V1 variant memory disclosure by speculation
over the SWAPGS instruction (bsc#1139358).
- CVE-2019-10207: A NULL pointer dereference was possible in the bluetooth
stack, which could lead to crashes. (bnc#1123959 bnc#1142857).
- CVE-2018-20855: In create_qp_common in drivers/infiniband/hw/mlx5/qp.c,
mlx5_ib_create_qp_resp was never initialized, resulting in a leak of
stack memory to userspace (bnc#1143045).
- CVE-2019-14284: drivers/block/floppy.c allowed a denial of service by
setup_format_params division-by-zero. Two consecutive ioctls can trigger
the bug: the first one should set the drive geometry with .sect and
.rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format
operation should be called. It can be triggered by an unprivileged local
user even when a floppy disk has not been inserted. (bnc#1143189).
- CVE-2019-14283: set_geometry in drivers/block/floppy.c did not validate
the sect and head fields, as demonstrated by an integer overflow and
out-of-bounds read. It can be triggered by an unprivileged local user
when a floppy disk has been inserted. (bnc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when
megasas_create_frame_pool() fails in megasas_alloc_cmds() in
drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of
Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when
hardware transactional memory is disabled, a local user can cause a
denial of service (TM Bad Thing exception and system crash) via a
sigreturn() system call that sends a crafted signal frame. This affects
arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c
(bnc#1142254 bnc#1142265).
- CVE-2019-13631: In parse_hid_report_descriptor in
drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device
can send an HID report that triggers an out-of-bounds write during
generation of debugging messages (bnc#1142023).


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1923=1



Package List:

- openSUSE Leap 15.1 (noarch):

kernel-devel-4.12.14-lp151.28.13.1
kernel-docs-4.12.14-lp151.28.13.1
kernel-docs-html-4.12.14-lp151.28.13.1
kernel-macros-4.12.14-lp151.28.13.1
kernel-source-4.12.14-lp151.28.13.1
kernel-source-vanilla-4.12.14-lp151.28.13.1

- openSUSE Leap 15.1 (x86_64):

kernel-debug-4.12.14-lp151.28.13.1
kernel-debug-base-4.12.14-lp151.28.13.1
kernel-debug-base-debuginfo-4.12.14-lp151.28.13.1
kernel-debug-debuginfo-4.12.14-lp151.28.13.1
kernel-debug-debugsource-4.12.14-lp151.28.13.1
kernel-debug-devel-4.12.14-lp151.28.13.1
kernel-debug-devel-debuginfo-4.12.14-lp151.28.13.1
kernel-default-4.12.14-lp151.28.13.1
kernel-default-base-4.12.14-lp151.28.13.1
kernel-default-base-debuginfo-4.12.14-lp151.28.13.1
kernel-default-debuginfo-4.12.14-lp151.28.13.1
kernel-default-debugsource-4.12.14-lp151.28.13.1
kernel-default-devel-4.12.14-lp151.28.13.1
kernel-default-devel-debuginfo-4.12.14-lp151.28.13.1
kernel-kvmsmall-4.12.14-lp151.28.13.1
kernel-kvmsmall-base-4.12.14-lp151.28.13.1
kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.13.1
kernel-kvmsmall-debuginfo-4.12.14-lp151.28.13.1
kernel-kvmsmall-debugsource-4.12.14-lp151.28.13.1
kernel-kvmsmall-devel-4.12.14-lp151.28.13.1
kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.13.1
kernel-obs-build-4.12.14-lp151.28.13.1
kernel-obs-build-debugsource-4.12.14-lp151.28.13.1
kernel-obs-qa-4.12.14-lp151.28.13.1
kernel-syms-4.12.14-lp151.28.13.1
kernel-vanilla-4.12.14-lp151.28.13.1
kernel-vanilla-base-4.12.14-lp151.28.13.1
kernel-vanilla-base-debuginfo-4.12.14-lp151.28.13.1
kernel-vanilla-debuginfo-4.12.14-lp151.28.13.1
kernel-vanilla-debugsource-4.12.14-lp151.28.13.1
kernel-vanilla-devel-4.12.14-lp151.28.13.1
kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.13.1


References:

https://www.suse.com/security/cve/CVE-2018-20855.html
https://www.suse.com/security/cve/CVE-2019-10207.html
https://www.suse.com/security/cve/CVE-2019-1125.html
https://www.suse.com/security/cve/CVE-2019-11810.html
https://www.suse.com/security/cve/CVE-2019-13631.html
https://www.suse.com/security/cve/CVE-2019-13648.html
https://www.suse.com/security/cve/CVE-2019-14283.html
https://www.suse.com/security/cve/CVE-2019-14284.html
https://bugzilla.suse.com/1051510
https://bugzilla.suse.com/1055117
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1083647
https://bugzilla.suse.com/1083710
https://bugzilla.suse.com/1085030
https://bugzilla.suse.com/1086103
https://bugzilla.suse.com/1102247
https://bugzilla.suse.com/1103991
https://bugzilla.suse.com/1103992
https://bugzilla.suse.com/1104745
https://bugzilla.suse.com/1106061
https://bugzilla.suse.com/1109837
https://bugzilla.suse.com/1111666
https://bugzilla.suse.com/1112374
https://bugzilla.suse.com/1114279
https://bugzilla.suse.com/1119222
https://bugzilla.suse.com/1123959
https://bugzilla.suse.com/1127034
https://bugzilla.suse.com/1127315
https://bugzilla.suse.com/1127611
https://bugzilla.suse.com/1129770
https://bugzilla.suse.com/1130972
https://bugzilla.suse.com/1131281
https://bugzilla.suse.com/1133021
https://bugzilla.suse.com/1134090
https://bugzilla.suse.com/1134097
https://bugzilla.suse.com/1134390
https://bugzilla.suse.com/1134399
https://bugzilla.suse.com/1135335
https://bugzilla.suse.com/1135642
https://bugzilla.suse.com/1135897
https://bugzilla.suse.com/1136217
https://bugzilla.suse.com/1136342
https://bugzilla.suse.com/1136352
https://bugzilla.suse.com/1136460
https://bugzilla.suse.com/1136461
https://bugzilla.suse.com/1136467
https://bugzilla.suse.com/1136502
https://bugzilla.suse.com/1137458
https://bugzilla.suse.com/1137534
https://bugzilla.suse.com/1137535
https://bugzilla.suse.com/1137584
https://bugzilla.suse.com/1137609
https://bugzilla.suse.com/1137811
https://bugzilla.suse.com/1137827
https://bugzilla.suse.com/1138874
https://bugzilla.suse.com/1139101
https://bugzilla.suse.com/1139358
https://bugzilla.suse.com/1139500
https://bugzilla.suse.com/1139619
https://bugzilla.suse.com/1140133
https://bugzilla.suse.com/1140139
https://bugzilla.suse.com/1140322
https://bugzilla.suse.com/1140426
https://bugzilla.suse.com/1140559
https://bugzilla.suse.com/1140652
https://bugzilla.suse.com/1140676
https://bugzilla.suse.com/1140903
https://bugzilla.suse.com/1140945
https://bugzilla.suse.com/1141312
https://bugzilla.suse.com/1141401
https://bugzilla.suse.com/1141402
https://bugzilla.suse.com/1141450
https://bugzilla.suse.com/1141452
https://bugzilla.suse.com/1141453
https://bugzilla.suse.com/1141454
https://bugzilla.suse.com/1141478
https://bugzilla.suse.com/1141558
https://bugzilla.suse.com/1142023
https://bugzilla.suse.com/1142052
https://bugzilla.suse.com/1142083
https://bugzilla.suse.com/1142112
https://bugzilla.suse.com/1142115
https://bugzilla.suse.com/1142117
https://bugzilla.suse.com/1142118
https://bugzilla.suse.com/1142119
https://bugzilla.suse.com/1142220
https://bugzilla.suse.com/1142221
https://bugzilla.suse.com/1142254
https://bugzilla.suse.com/1142265
https://bugzilla.suse.com/1142350
https://bugzilla.suse.com/1142351
https://bugzilla.suse.com/1142354
https://bugzilla.suse.com/1142359
https://bugzilla.suse.com/1142450
https://bugzilla.suse.com/1142623
https://bugzilla.suse.com/1142635
https://bugzilla.suse.com/1142673
https://bugzilla.suse.com/1142685
https://bugzilla.suse.com/1142701
https://bugzilla.suse.com/1142857
https://bugzilla.suse.com/1142868
https://bugzilla.suse.com/1143003
https://bugzilla.suse.com/1143045
https://bugzilla.suse.com/1143105
https://bugzilla.suse.com/1143185
https://bugzilla.suse.com/1143189
https://bugzilla.suse.com/1143191
https://bugzilla.suse.com/1143209
https://bugzilla.suse.com/1143466
https://bugzilla.suse.com/1143507
https://bugzilla.suse.com/1143738
https://bugzilla.suse.com/1144474
https://bugzilla.suse.com/1144518

--



openSUSE-SU-2019:1924-1: important: Security update for the Linux Kernel
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1924-1
Rating: important
References: #1051510 #1055117 #1071995 #1083647 #1083710
#1085030 #1086103 #1102247 #1106061 #1111666
#1114279 #1119222 #1123959 #1127034 #1127315
#1129770 #1130972 #1131281 #1133021 #1134097
#1134390 #1134399 #1135335 #1135642 #1135897
#1137458 #1137534 #1137535 #1137584 #1137609
#1137811 #1137827 #1139101 #1139358 #1139500
#1140133 #1140139 #1140322 #1140426 #1140652
#1140887 #1140888 #1140889 #1140891 #1140893
#1140903 #1140945 #1140948 #1140954 #1140955
#1140956 #1140957 #1140958 #1140959 #1140960
#1140961 #1140962 #1140964 #1140971 #1140972
#1140992 #1141401 #1141402 #1141450 #1141452
#1141453 #1141454 #1141478 #1142023 #1142112
#1142117 #1142118 #1142119 #1142220 #1142221
#1142254 #1142265 #1142350 #1142351 #1142354
#1142359 #1142450 #1142496 #1142635 #1142685
#1142701 #1142857 #1142868 #1143003 #1143045
#1143105 #1143185 #1143189 #1143191 #1143466
#1143507 #1144474 #1144518
Cross-References: CVE-2018-20855 CVE-2019-10207 CVE-2019-1125
CVE-2019-11810 CVE-2019-13631 CVE-2019-13648
CVE-2019-14283 CVE-2019-14284
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves 8 vulnerabilities and has 90 fixes is
now available.

Description:



The openSUSE Leap 15.0 kernel was updated to receive various security and
bugfixes.


The following security bugs were fixed:

- CVE-2019-1125: Fix Spectre V1 variant memory disclosure by speculation
over the SWAPGS instruction (bsc#1139358).
- CVE-2019-10207: A NULL pointer dereference was possible in the bluetooth
stack, which could lead to crashes. (bnc#1123959 bnc#1142857).
- CVE-2018-20855: In create_qp_common in drivers/infiniband/hw/mlx5/qp.c,
mlx5_ib_create_qp_resp was never initialized, resulting in a leak of
stack memory to userspace (bnc#1143045).
- CVE-2019-14284: drivers/block/floppy.c allowed a denial of service by
setup_format_params division-by-zero. Two consecutive ioctls can trigger
the bug: the first one should set the drive geometry with .sect and
.rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format
operation should be called. It can be triggered by an unprivileged local
user even when a floppy disk has not been inserted. NOTE: QEMU creates
the floppy device by default (bnc#1143189).
- CVE-2019-14283: set_geometry in drivers/block/floppy.c did not validate
the sect and head fields, as demonstrated by an integer overflow and
out-of-bounds read. It can be triggered by an unprivileged local user
when a floppy disk has been inserted. NOTE: QEMU creates the floppy
device by default (bnc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when
megasas_create_frame_pool() fails in megasas_alloc_cmds() in
drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of
Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when
hardware transactional memory is disabled, a local user can cause a
denial of service (TM Bad Thing exception and system crash) via a
sigreturn() system call that sends a crafted signal frame. This affects
arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c
(bnc#1142254 bnc#1142265).
- CVE-2019-13631: In parse_hid_report_descriptor in
drivers/input/tablet/gtco.c in the Linux kernel a malicious USB device
can send an HID report that triggers an out-of-bounds write during
generation of debugging messages (bnc#1142023).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1924=1



Package List:

- openSUSE Leap 15.0 (x86_64):

kernel-debug-4.12.14-lp150.12.70.1
kernel-debug-base-4.12.14-lp150.12.70.1
kernel-debug-base-debuginfo-4.12.14-lp150.12.70.1
kernel-debug-debuginfo-4.12.14-lp150.12.70.1
kernel-debug-debugsource-4.12.14-lp150.12.70.1
kernel-debug-devel-4.12.14-lp150.12.70.1
kernel-debug-devel-debuginfo-4.12.14-lp150.12.70.1
kernel-default-4.12.14-lp150.12.70.1
kernel-default-base-4.12.14-lp150.12.70.1
kernel-default-base-debuginfo-4.12.14-lp150.12.70.1
kernel-default-debuginfo-4.12.14-lp150.12.70.1
kernel-default-debugsource-4.12.14-lp150.12.70.1
kernel-default-devel-4.12.14-lp150.12.70.1
kernel-default-devel-debuginfo-4.12.14-lp150.12.70.1
kernel-kvmsmall-4.12.14-lp150.12.70.1
kernel-kvmsmall-base-4.12.14-lp150.12.70.1
kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.70.1
kernel-kvmsmall-debuginfo-4.12.14-lp150.12.70.1
kernel-kvmsmall-debugsource-4.12.14-lp150.12.70.1
kernel-kvmsmall-devel-4.12.14-lp150.12.70.1
kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.70.1
kernel-obs-build-4.12.14-lp150.12.70.1
kernel-obs-build-debugsource-4.12.14-lp150.12.70.1
kernel-obs-qa-4.12.14-lp150.12.70.1
kernel-syms-4.12.14-lp150.12.70.1
kernel-vanilla-4.12.14-lp150.12.70.1
kernel-vanilla-base-4.12.14-lp150.12.70.1
kernel-vanilla-base-debuginfo-4.12.14-lp150.12.70.1
kernel-vanilla-debuginfo-4.12.14-lp150.12.70.1
kernel-vanilla-debugsource-4.12.14-lp150.12.70.1
kernel-vanilla-devel-4.12.14-lp150.12.70.1
kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.70.1

- openSUSE Leap 15.0 (noarch):

kernel-devel-4.12.14-lp150.12.70.1
kernel-docs-4.12.14-lp150.12.70.1
kernel-docs-html-4.12.14-lp150.12.70.1
kernel-macros-4.12.14-lp150.12.70.1
kernel-source-4.12.14-lp150.12.70.1
kernel-source-vanilla-4.12.14-lp150.12.70.1


References:

https://www.suse.com/security/cve/CVE-2018-20855.html
https://www.suse.com/security/cve/CVE-2019-10207.html
https://www.suse.com/security/cve/CVE-2019-1125.html
https://www.suse.com/security/cve/CVE-2019-11810.html
https://www.suse.com/security/cve/CVE-2019-13631.html
https://www.suse.com/security/cve/CVE-2019-13648.html
https://www.suse.com/security/cve/CVE-2019-14283.html
https://www.suse.com/security/cve/CVE-2019-14284.html
https://bugzilla.suse.com/1051510
https://bugzilla.suse.com/1055117
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1083647
https://bugzilla.suse.com/1083710
https://bugzilla.suse.com/1085030
https://bugzilla.suse.com/1086103
https://bugzilla.suse.com/1102247
https://bugzilla.suse.com/1106061
https://bugzilla.suse.com/1111666
https://bugzilla.suse.com/1114279
https://bugzilla.suse.com/1119222
https://bugzilla.suse.com/1123959
https://bugzilla.suse.com/1127034
https://bugzilla.suse.com/1127315
https://bugzilla.suse.com/1129770
https://bugzilla.suse.com/1130972
https://bugzilla.suse.com/1131281
https://bugzilla.suse.com/1133021
https://bugzilla.suse.com/1134097
https://bugzilla.suse.com/1134390
https://bugzilla.suse.com/1134399
https://bugzilla.suse.com/1135335
https://bugzilla.suse.com/1135642
https://bugzilla.suse.com/1135897
https://bugzilla.suse.com/1137458
https://bugzilla.suse.com/1137534
https://bugzilla.suse.com/1137535
https://bugzilla.suse.com/1137584
https://bugzilla.suse.com/1137609
https://bugzilla.suse.com/1137811
https://bugzilla.suse.com/1137827
https://bugzilla.suse.com/1139101
https://bugzilla.suse.com/1139358
https://bugzilla.suse.com/1139500
https://bugzilla.suse.com/1140133
https://bugzilla.suse.com/1140139
https://bugzilla.suse.com/1140322
https://bugzilla.suse.com/1140426
https://bugzilla.suse.com/1140652
https://bugzilla.suse.com/1140887
https://bugzilla.suse.com/1140888
https://bugzilla.suse.com/1140889
https://bugzilla.suse.com/1140891
https://bugzilla.suse.com/1140893
https://bugzilla.suse.com/1140903
https://bugzilla.suse.com/1140945
https://bugzilla.suse.com/1140948
https://bugzilla.suse.com/1140954
https://bugzilla.suse.com/1140955
https://bugzilla.suse.com/1140956
https://bugzilla.suse.com/1140957
https://bugzilla.suse.com/1140958
https://bugzilla.suse.com/1140959
https://bugzilla.suse.com/1140960
https://bugzilla.suse.com/1140961
https://bugzilla.suse.com/1140962
https://bugzilla.suse.com/1140964
https://bugzilla.suse.com/1140971
https://bugzilla.suse.com/1140972
https://bugzilla.suse.com/1140992
https://bugzilla.suse.com/1141401
https://bugzilla.suse.com/1141402
https://bugzilla.suse.com/1141450
https://bugzilla.suse.com/1141452
https://bugzilla.suse.com/1141453
https://bugzilla.suse.com/1141454
https://bugzilla.suse.com/1141478
https://bugzilla.suse.com/1142023
https://bugzilla.suse.com/1142112
https://bugzilla.suse.com/1142117
https://bugzilla.suse.com/1142118
https://bugzilla.suse.com/1142119
https://bugzilla.suse.com/1142220
https://bugzilla.suse.com/1142221
https://bugzilla.suse.com/1142254
https://bugzilla.suse.com/1142265
https://bugzilla.suse.com/1142350
https://bugzilla.suse.com/1142351
https://bugzilla.suse.com/1142354
https://bugzilla.suse.com/1142359
https://bugzilla.suse.com/1142450
https://bugzilla.suse.com/1142496
https://bugzilla.suse.com/1142635
https://bugzilla.suse.com/1142685
https://bugzilla.suse.com/1142701
https://bugzilla.suse.com/1142857
https://bugzilla.suse.com/1142868
https://bugzilla.suse.com/1143003
https://bugzilla.suse.com/1143045
https://bugzilla.suse.com/1143105
https://bugzilla.suse.com/1143185
https://bugzilla.suse.com/1143189
https://bugzilla.suse.com/1143191
https://bugzilla.suse.com/1143466
https://bugzilla.suse.com/1143507
https://bugzilla.suse.com/1144474
https://bugzilla.suse.com/1144518





Printed from Linux Compatible (https://www.linuxcompatible.org/news/story/kernel_updates_for_opensuse_leap_15.html)