Malware Devil

Monday, August 10, 2020

ESB-2020.2739 – [SUSE] linux kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2739
                   Security update for the Linux Kernel
                              10 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           linux kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Root Compromise                 -- Existing Account      
                   Access Privileged Data          -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
                   Unauthorised Access             -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-15780 CVE-2020-15393 CVE-2020-14416
                   CVE-2020-13974 CVE-2020-13143 CVE-2020-12888
                   CVE-2020-12771 CVE-2020-12769 CVE-2020-12657
                   CVE-2020-12656 CVE-2020-12655 CVE-2020-12654
                   CVE-2020-12653 CVE-2020-12652 CVE-2020-12464
                   CVE-2020-12114 CVE-2020-10781 CVE-2020-10773
                   CVE-2020-10769 CVE-2020-10768 CVE-2020-10767
                   CVE-2020-10766 CVE-2020-10757 CVE-2020-10751
                   CVE-2020-10732 CVE-2020-10720 CVE-2020-10711
                   CVE-2020-10690 CVE-2020-10135 CVE-2020-0543
                   CVE-2020-0305 CVE-2019-20908 CVE-2019-20812
                   CVE-2019-20810 CVE-2019-20806 CVE-2019-19462
                   CVE-2019-16746 CVE-2019-9455 CVE-2018-1000199

Reference:         ESB-2020.2711
                   ESB-2020.2662
                   ESB-2020.2661
                   ESB-2020.2642
                   ESB-2020.2615

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20202156-1
   https://www.suse.com/support/update/announcement/2020/suse-su-20202152-1

Comment: This bulletin contains two (2) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:2156-1
Rating:            important
References:        #1051510 #1058115 #1065729 #1071995 #1082555 #1085030
                   #1089895 #1104967 #1111666 #1114279 #1133021 #1144333
                   #1148868 #1150660 #1151794 #1152107 #1152489 #1152624
                   #1154824 #1157169 #1158265 #1158983 #1159058 #1159199
                   #1160388 #1160947 #1161016 #1162002 #1162063 #1165183
                   #1165741 #1166969 #1167574 #1167851 #1168081 #1168503
                   #1168670 #1169020 #1169194 #1169514 #1169525 #1169625
                   #1169795 #1170011 #1170056 #1170125 #1170145 #1170345
                   #1170457 #1170522 #1170592 #1170618 #1170620 #1170770
                   #1170778 #1170791 #1170901 #1171078 #1171098 #1171118
                   #1171124 #1171189 #1171191 #1171195 #1171202 #1171205
                   #1171217 #1171218 #1171219 #1171220 #1171293 #1171417
                   #1171424 #1171527 #1171558 #1171599 #1171600 #1171601
                   #1171602 #1171604 #1171605 #1171606 #1171607 #1171608
                   #1171609 #1171610 #1171611 #1171612 #1171613 #1171614
                   #1171615 #1171616 #1171617 #1171618 #1171619 #1171620
                   #1171621 #1171622 #1171623 #1171624 #1171625 #1171626
                   #1171673 #1171679 #1171691 #1171694 #1171695 #1171736
                   #1171761 #1171868 #1171904 #1171948 #1171949 #1171951
                   #1171952 #1171982 #1171983 #1172096 #1172097 #1172098
                   #1172099 #1172101 #1172102 #1172103 #1172104 #1172127
                   #1172130 #1172185 #1172188 #1172199 #1172221 #1172253
                   #1172257 #1172317 #1172342 #1172343 #1172344 #1172366
                   #1172391 #1172397 #1172453 #1172458 #1172484 #1172759
                   #1172775 #1172781 #1172782 #1172783 #1172999 #1173265
                   #1173280 #1173428 #1173462 #1173659
Cross-References:  CVE-2018-1000199 CVE-2019-16746 CVE-2019-19462
                   CVE-2019-20806 CVE-2019-20810 CVE-2019-20812 CVE-2019-9455
                   CVE-2020-0543 CVE-2020-10690 CVE-2020-10711 CVE-2020-10720
                   CVE-2020-10732 CVE-2020-10751 CVE-2020-10757 CVE-2020-10766
                   CVE-2020-10767 CVE-2020-10768 CVE-2020-10769 CVE-2020-10773
                   CVE-2020-12114 CVE-2020-12464 CVE-2020-12652 CVE-2020-12653
                   CVE-2020-12654 CVE-2020-12655 CVE-2020-12656 CVE-2020-12657
                   CVE-2020-12769 CVE-2020-12888 CVE-2020-13143 CVE-2020-13974
                   CVE-2020-14416
Affected Products:
                   SUSE Linux Enterprise Real Time Extension 12-SP4
______________________________________________________________________________

An update that solves 32 vulnerabilities and has 122 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP4 RT kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:

  o CVE-2020-10135: Legacy pairing and secure-connections pairing
    authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may
    have allowed an unauthenticated user to complete authentication without
    pairing credentials via adjacent access. An unauthenticated, adjacent
    attacker could impersonate a Bluetooth BR/EDR master or slave to pair with
    a previously paired remote device to successfully complete the
    authentication procedure without knowing the link key (bnc#1171988).
  o CVE-2020-0305: In cdev_get of char_dev.c, there is a possible
    use-after-free due to a race condition. This could lead to local escalation
    of privilege with System execution privileges needed. User interaction is
    not needed for exploitation (bnc#1174462).
  o CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where
    incorrect access permissions for the efivar_ssdt ACPI variable could be
    used by attackers to bypass lockdown or secure boot restrictions, aka
    CID-1957a85b0032 (bnc#1173567).
  o CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
  o CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c
    where injection of malicious ACPI tables via configfs could be used by
    attackers to bypass lockdown and secure boot restrictions, aka
    CID-75b0cea7bf30 (bnc#1173573).
  o CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a
    memory leak, aka CID-28ebeb8db770 (bnc#1173514).
  o CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a
    deadlock if a coalescing operation fails (bnc#1171732).
  o CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled
    memory space (bnc#1171868).
  o CVE-2020-10769: A buffer over-read flaw was found in
    crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic
    algorithm's module, authenc. When a payload longer than 4 bytes, and is not
    following 4-byte alignment boundary guidelines, it causes a buffer
    over-read threat, leading to a system crash. This flaw allowed a local
    attacker with user privileges to cause a denial of service (bnc#1173265).
  o CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed
    (bnc#1172999).
  o CVE-2020-14416: A race condition in tty->disc_data handling in the slip and
    slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824.
    This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#
    1162002).
  o CVE-2020-10766: Fixed an issue which allowed an attacker with a local
    account to disable SSBD protection (bnc#1172781).
  o CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was
    disabled in certain circumstances, leaving the system open to a spectre v2
    style attack (bnc#1172782).
  o CVE-2020-10768: Fixed an issue with the prctl() function, where indirect
    branch speculation could be enabled even though it was diabled before (bnc#
    1172783).
  o CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if
    k_ascii is called several times in a row (bnc#1172775).
  o CVE-2020-0543: Fixed a side channel attack against special registers which
    could have resulted in leaking of read values to cores other than the one
    which called it. This attack is known as Special Register Buffer Data
    Sampling (SRBDS) or "CrossTalk" (bsc#1154824).
  o CVE-2020-13974: Fixed an integer overflow in drivers/tty/vt/keyboard.c
    which could have been caused by calling multiple time in a row k_ascii (bsc
    #1172775).
  o CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in
    drivers/usb/gadget/configfs.c (bsc#1171982).
  o CVE-2020-12769: Fixed an issue which could have allowed attackers to cause
    a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#
    1171983).
  o CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
  o CVE-2020-12656: Fixed an improper handling of certain domain_release calls
    leadingch could have led to a memory leak (bsc#1171219).
  o CVE-2020-12655: Fixed an issue which could have allowed attackers to
    trigger a sync of excessive duration via an XFS v5 image with crafted
    metadata (bsc#1171217).
  o CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a
    remote AP to trigger a heap-based buffer overflow (bsc#1171202).
  o CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed
    local users to gain privileges or cause a denial of service (bsc#1171195).
  o CVE-2020-12652: Fixed an issue which could have allowed local users to hold
    an incorrect lock during the ioctl operation and trigger a race condition
    (bsc#1171218).
  o CVE-2020-12464: Fixed a use-after-free due to a transfer without a
    reference (bsc#1170901).
  o CVE-2020-12114: Fixed a pivot_root race condition which could have allowed
    local users to cause a denial of service (panic) by corrupting a mountpoint
    reference counter (bsc#1171098).
  o CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap
    could have caused user PTE access (bsc#1172317).
  o CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where
    it was assumed that an skb would only contain a single netlink message (bsc
    #1171189).
  o CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to
    uninitialized data (bsc#1171220).
  o CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#
    1170778).
  o CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which
    could have allowed a remote network user to crash the kernel resulting in a
    denial of service (bsc#1171191).
  o CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev
    (bsc#1170056).
  o CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video
    driver. This could lead to local information disclosure with System
    execution privileges needed (bsc#1170345).
  o CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could
    have resulted in a denial of service (bsc#1172453).
  o CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free
    (bsc#1172458).
  o CVE-2019-20806: Fixed a null pointer dereference which may had lead to
    denial of service (bsc#1172199).
  o CVE-2019-19462: Fixed an issue which could have allowed local user to cause
    denial of service (bsc#1158265).
  o CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where
    the length of variable elements in a beacon head was not checked, leading
    to a buffer overflow (bnc#1152107 1173659).
  o CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c
    did not call snd_card_free for a failure path, which caused a memory leak,
    aka CID-9453264ef586 (bnc#1172458).
  o CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#
    1089895).


The following non-security bugs were fixed:

  o ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#
    1051510).
  o ACPI: PM: Avoid using power resources if there are none for D0 (bsc#
    1051510).
  o ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile()
    (bsc#1051510).
  o acpi/x86: ignore unspecified bit positions in the ACPI global lock field
    (bsc#1051510).
  o agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
  o ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
  o ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
  o ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
  o ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
  o ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
  o ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
  o ALSA: hda: Keep the controller initialization even if no codecs found (bsc#
    1051510).
  o ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
  o ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
  o ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
  o ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
  o ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
  o ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#
    1171293).
  o ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
  o ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
  o ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio
    option (git-fixes).
  o ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
  o ALSA: pcm: fix incorrect hw_base increase (git-fixes).
  o ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#
    1170522).
  o ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
    (git-fixes).
  o ALSA: usb-audio: Add control message quirk delay for Kingston HyperX
    headset (git-fixes).
  o ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
  o ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#
    1051510).
  o ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#
    1051510).
  o ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC
    (git-fixes).
  o ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
  o ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#
    1051510).
  o ASoC: dapm: connect virtual mux with default value (bsc#1051510).
  o ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
  o ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
  o ASoC: fix regwmask (bsc#1051510).
  o ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#
    1051510).
  o ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#
    1111666).
  o ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
  o ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
  o b43legacy: Fix case where channel status is corrupted (bsc#1051510).
  o batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
  o batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
  o batman-adv: Fix refcnt leak in batadv_store_throughput_override
    (git-fixes).
  o batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
  o bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git
    fixes (block drivers)).
  o bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
  o bcache: fix incorrect data type usage in btree_flush_write() (git fixes
    (block drivers)).
  o bcache: Revert "bcache: shrink btree node cache after bch_btree_check()"
    (git fixes (block drivers)).
  o block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
  o block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#
    1171673).
  o block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
  o block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
  o block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
  o block: fix busy device checking in blk_drop_partitions (bsc#1171948).
  o block: fix memleak of bio integrity data (git fixes (block drivers)).
  o block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
  o block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
  o block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block
    drivers)).
  o bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets()
    (networking-stable-20_03_28).
  o bnxt_en: reinitialize IRQs when MTU is modified
    (networking-stable-20_03_14).
  o bonding/alb: make sure arp header is pulled before accessing it
    (networking-stable-20_03_14).
  o brcmfmac: abort and release host after error (bsc#1051510).
  o btrfs: always wait on ordered extents at fsync time (bsc#1171761).
  o btrfs: clean up the left over logged_list usage (bsc#1171761).
  o btrfs: do not zero f_bavail if we have available space (bsc#1168081).
  o btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
  o Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).
  o btrfs: fix log context list corruption after rename whiteout error (bsc#
    1172342).
  o Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#
    1171761).
  o btrfs: fix missing file extent item for hole after ranged fsync (bsc#
    1171761).
  o Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES
    (bsc#1171761).
  o btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).
  o btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#
    1172343).
  o Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#
    1171761).
  o btrfs: move the dio_sem higher up the callchain (bsc#1171761).
  o btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway
    balance (bsc#1171417 bsc#1160947 bsc#1172366).
  o btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417
    bsc#1160947 bsc#1172366).
  o btrfs: Remove extra parentheses from condition in copy_items() (bsc#
    1171761).
  o Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).
  o Btrfs: remove no longer used logged range variables when logging extents
    (bsc#1171761).
  o Btrfs: remove no longer used 'sync' member from transaction handle (bsc#
    1171761).
  o btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).
  o btrfs: remove the logged extents infrastructure (bsc#1171761).
  o btrfs: remove the wait ordered logic in the log_one_extent path (bsc#
    1171761).
  o btrfs: setup a nofs context for memory allocation at btrfs_create_tree()
    (bsc#1172127).
  o btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#
    1172127).
  o btrfs: use nofs context when initializing security xattrs to avoid deadlock
    (bsc#1172127).
  o btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
  o can: add missing attribute validation for termination
    (networking-stable-20_03_14).
  o cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
  o CDC-ACM: heed quirk also in error handling (git-fixes).
  o cdc-acm: introduce a cool down (git-fixes).
  o ceph: fix double unlock in handle_cap_export() (bsc#1171694).
  o ceph: fix endianness bug when handling MDS session feature bits (bsc#
    1171695).
  o cgroup, netclassid: periodically release file_lock on classid updating
    (networking-stable-20_03_14).
  o CIFS: Allocate crypto structures on the fly for calculating signatures of
    incoming packets (bsc#1144333).
  o CIFS: Allocate encryption header through kmalloc (bsc#1144333).
  o CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
  o CIFS: check new file size when extending file by fallocate (bsc#1144333).
  o CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#
    1144333).
  o CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
  o CIFS: do not share tcons with DFS (bsc#1144333).
  o CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
  o CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
  o CIFS: Fix bug which the return value by asynchronous read is error (bsc#
    1144333).
  o CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
  o cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#
    1144333).
  o cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc
    #1161016).
  o CIFS: improve read performance for page size 64KB & cache=strict & vers=
    2.1+ (bsc#1144333).
  o CIFS: Increment num_remote_opens stats counter even in case of
    smb2_query_dir_first (bsc#1144333).
  o CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#
    1144333).
  o CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
  o cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#
    1161016).
  o CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#
    1144333).
  o CIFS: smbd: Calculate the correct maximum packet size for segmented
    SMBDirect send/receive (bsc#1144333).
  o CIFS: smbd: Check and extend sender credits in interrupt context (bsc#
    1144333).
  o CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
  o CIFS: smbd: Do not schedule work to send immediate packet on every receive
    (bsc#1144333).
  o CIFS: smbd: Merge code to track pending packets (bsc#1144333).
  o CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
  o CIFS: smbd: Update receive credits before sending and deal with credits
    roll back on failure before sending (bsc#1144333).
  o CIFS: Warn less noisily on default mount (bsc#1144333).
  o clk: Add clk_hw_unregister_composite helper function definition (bsc#
    1051510).
  o clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
  o clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
  o clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
  o clk: imx: make mux parent strings const (bsc#1051510).
  o clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
  o clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
  o clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
  o clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC
    (bsc#1170620).
  o clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
  o compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block
    drivers)).
  o compat_ioctl: block: handle Persistent Reservations (git fixes (block
    drivers)).
  o component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
  o copy_{to,from}_user(): consolidate object size checks (git fixes).
  o coresight: do not use the BIT() macro in the UAPI header (git fixes (block
    drivers)).
  o cpufreq: s3c64xx: Remove pointless NULL check in
    s3c64xx_cpufreq_driver_init (bsc#1051510).
  o crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is
    fully iterated (git-fixes).
  o crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
  o crypto: ccp - Clean up and exit correctly on allocation failure
    (git-fixes).
  o crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
  o crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
  o debugfs: Add debugfs_create_xul() for hexadecimal unsigned long
    (git-fixes).
  o dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
  o dm btree: increase rebalance threshold in __rebalance2() (git fixes (block
    drivers)).
  o dm cache: fix a crash due to incorrect work item cancelling (git fixes
    (block drivers)).
  o dm crypt: fix benbi IV constructor crash if used in authenticated mode (git
    fixes (block drivers)).
  o dm: fix potential for q->make_request_fn NULL pointer (git fixes (block
    drivers)).
  o dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
  o dm space map common: fix to ensure new block isn't already in use (git
    fixes (block drivers)).
  o dm: various cleanups to md->queue initialization code (git fixes).
  o dm verity fec: fix hash block number in verity_fec_decode (git fixes (block
    drivers)).
  o dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block
    drivers)).
  o dm writecache: fix data corruption when reloading the target (git fixes
    (block drivers)).
  o dm writecache: fix incorrect flush sequence when doing SSD mode commit (git
    fixes (block drivers)).
  o dm writecache: verify watermark during resume (git fixes (block drivers)).
  o dm zoned: fix invalid memory access (git fixes (block drivers)).
  o dm zoned: reduce overhead of backing device checks (git fixes (block
    drivers)).
  o dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git
    fixes (block drivers)).
  o dm zoned: support zone sizes smaller than 128MiB (git fixes (block
    drivers)).
  o dp83640: reverse arguments to list_add_tail (git-fixes).
  o Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#
    1172253).
  o Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic
    (bsc#1170618).
  o Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#
    1170618).
  o Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
  o Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer
    (bsc#1170618).
  o Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
  o Drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#
    1051510).
  o drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
  o drm/crc: Actually allow to change the crc source (bsc#1114279) * offset
    changes
  o drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
  o drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
  o drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
  o drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
  o drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#
    1114279)
  o drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed
    display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c *
    context changes
  o drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
  o drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#
    1114279)
  o drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
  o drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
  o drm/qxl: qxl_release use after free (bsc#1051510).
  o drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) *
    offset changes
  o dump_stack: avoid the livelock of the dump_lock (git fixes (block
    drivers)).
  o e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
  o e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc
    #1051510).
  o EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
  o EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#
    1169525).
  o evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
  o evm: Fix a small race in init_desc() (bsc#1051510).
  o ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
  o ext4: fix extent_status fragmentation for plain files (bsc#1171949).
  o ext4: use non-movable memory for superblock readahead (bsc#1171952).
  o extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#
    1051510).
  o fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
  o fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/
    video/fbdev/core to drivers/video/console * context changes
  o fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)
  o fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)
  o fib: add missing attribute validation for tun_id
    (networking-stable-20_03_14).
  o firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
  o fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
  o fs/seq_file.c: simplify seq_file iteration code and interface (bsc#
    1170125).
  o gpiolib: Document that GPIO line names are not globally unique (bsc#
    1051510).
  o gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
  o gre: fix uninit-value in __iptunnel_pull_header
    (networking-stable-20_03_14).
  o HID: hid-input: clear unmapped usages (git-fixes).
  o HID: hyperv: Add a module description line (bsc#1172253).
  o HID: i2c-hid: add Trekstor Primebook C11B to descriptor override
    (git-fixes).
  o HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
  o HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
  o HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
  o HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices
    (git-fixes).
  o hrtimer: Annotate lockless access to timer->state (git fixes (block
    drivers)).
  o hsr: add restart routine into hsr_get_node_list()
    (networking-stable-20_03_28).
  o hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
  o hsr: fix general protection fault in hsr_addr_is_self()
    (networking-stable-20_03_28).
  o hsr: set .netnsok flag (networking-stable-20_03_28).
  o hsr: use rcu_read_lock() in hsr_get_node_{list/status}()
    (networking-stable-20_03_28).
  o i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present
    (git-fixes).
  o i2c: acpi: put device when verifying client fails (git-fixes).
  o i2c: brcmstb: remove unused struct member (git-fixes).
  o i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
  o i2c: core: decrease reference count of device node in i2c_unregister_device
    (git-fixes).
  o i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#
    1051510).
  o i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
  o i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array
    (git-fixes).
  o i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
  o i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
  o i2c: isch: Remove unnecessary acpi.h include (git-fixes).
  o i2c: mux: demux-pinctrl: Fix an error handling path in
    'i2c_demux_pinctrl_probe()' (bsc#1051510).
  o i2c: st: fix missing struct parameter description (bsc#1051510).
  o IB/ipoib: Add child to parent list only if device initialized (bsc#
    1168503).
  o IB/ipoib: Consolidate checking of the proposed child interface (bsc#
    1168503).
  o IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#
    1168503).
  o IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
  o IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
  o IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
  o IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
  o IB/ipoib: Move init code to ndo_init (bsc#1168503).
  o IB/ipoib: Replace printk with pr_warn (bsc#1168503).
  o IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
  o IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
  o ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
  o ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#
    184611).
  o ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#
    185369).
  o ibmvnic: Flush existing work items before device removal (bsc#1065729).
  o ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
  o ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#
    184239).
  o iio:ad7797: Use correct attribute_group (bsc#1051510).
  o iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
  o iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
  o iio: adc: stm32-adc: Use dma_request_chan() instead
    dma_request_slave_channel() (bsc#1051510).
  o iio: buffer: Do not allow buffers without any channels enabled to be
    activated (bsc#1051510).
  o iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#
    1051510).
  o iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
  o iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
  o iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
  o iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#
    1051510).
  o iio: xilinx-xadc: Fix sequencer configuration for aux channels in
    simultaneous mode (bsc#1051510).
  o ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#
    1051510).
  o ima: Fix ima digest hash table key calculation (bsc#1051510).
  o ima: Fix return value of ima_write_policy() (git-fixes).
  o include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc
    #1148868).
  o Input: evdev - call input_flush_device() on release(), not flush() (bsc#
    1051510).
  o Input: hyperv-keyboard - add module description (bsc#1172253).
  o Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
  o Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
  o Input: raydium_i2c_ts - use true and false for boolean values (bsc#
    1051510).
  o Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#
    1051510).
  o Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
  o Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
  o Input: xpad - add custom init packet for Xbox One S controllers (bsc#
    1051510).
  o iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
  o iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
  o iommu/amd: Do not loop forever when trying to increase address space (bsc#
    1172098).
  o iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#
    1172099).
  o iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
  o iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
  o iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
  o iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
  o ipmi: fix hung processes in __get_guid() (git-fixes).
  o ipv4: fix a RCU-list lock in fib_triestat_seq_show
    (networking-stable-20_04_02).
  o ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface
    (networking-stable-20_03_14).
  o ipv6: do not auto-add link-local address to lag ports
    (networking-stable-20_04_09).
  o ipv6: Fix nlmsg_flags when splitting a multipath route
    (networking-stable-20_03_01).
  o ipv6: Fix route replacement with dev-only route
    (networking-stable-20_03_01).
  o ipvlan: add cond_resched_rcu() while processing muticast backlog
    (networking-stable-20_03_14).
  o ipvlan: do not deref eth hdr before checking it's set
    (networking-stable-20_03_14).
  o ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()
    (networking-stable-20_03_14).
  o iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
  o kABI fix for early XHCI debug (git-fixes).
  o kabi for for md: improve handling of bio with REQ_PREFLUSH in
    md_flush_request() (git-fixes).
  o kabi, protect struct ib_device (bsc#1168503).
  o kabi/severities: Do not track KVM internal symbols.
  o kabi/severities: Ingnore get_dev_data() The function is internal to the AMD
    IOMMU driver and must not be called by any third party.
  o kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
  o KEYS: reaching the keys quotas correctly (bsc#1051510).
  o KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
  o KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
  o KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
  o KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#
    1114279).
  o KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#
    1114279).
  o KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
  o KVM: s390: vsie: Fix possible race when shadowing region 3 tables
    (git-fixes).
  o KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks
    (git-fixes).
  o KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
  o KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#
    1152489).
  o kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
  o KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc
    #1171904).
  o KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
  o l2tp: Allow management of tunnels and session in user namespace
    (networking-stable-20_04_17).
  o libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
  o libata: Return correct status in sata_pmp_eh_recover_pm() when
    ATA_DFLAG_DETACH is set (bsc#1051510).
  o libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).
  o lib: raid6: fix awk build warnings (git fixes (block drivers)).
  o lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes
    (block drivers)).
  o lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block
    drivers)).
  o livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
  o livepatch: Disallow vmlinux.ko (bsc#1071995).
  o livepatch: Make klp_apply_object_relocs static (bsc#1071995).
  o livepatch: Prevent module-specific KLP rela sections from referencing
    vmlinux symbols (bsc#1071995).
  o livepatch: Remove .klp.arch (bsc#1071995).
  o locks: print unsigned ino in /proc/locks (bsc#1171951).
  o mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
  o mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
  o mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
  o macsec: avoid to set wrong mtu (bsc#1051510).
  o macsec: restrict to ethernet devices (networking-stable-20_03_28).
  o macvlan: add cond_resched() during multicast processing
    (networking-stable-20_03_14).
  o macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
  o md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
  o md: improve handling of bio with REQ_PREFLUSH in md_flush_request()
    (git-fixes).
  o md/raid0: Fix an error message in raid0_make_request() (git fixes (block
    drivers)).
  o md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
  o md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes
    (block drivers)).
  o media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
  o media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
  o media: ti-vpe: cal: fix disable_irqs to only the intended target
    (git-fixes).
  o mei: release me_cl object reference (bsc#1051510).
  o mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
  o mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE
    (networking-stable-20_04_09).
  o mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
  o mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
  o mmc: fix compilation of user API (bsc#1051510).
  o mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
  o mmc: meson-gx: simplify interrupt handler (git-fixes).
  o mmc: renesas_sdhi: limit block count to 16 bit for old revisions
    (git-fixes).
  o mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
  o mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
  o mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
  o mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#
    1051510).
  o mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
  o mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#
    1051510).
  o mmc: tmio: fix access width of Block Count Register (git-fixes).
  o mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes
    (block drivers)).
  o mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
  o mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
  o mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
  o mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
  o mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
  o mwifiex: Fix memory corruption in dump_station (bsc#1051510).
  o net: bcmgenet: correct per TX/RX ring statistics
    (networking-stable-20_04_27).
  o net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
  o net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
  o net: dsa: bcm_sf2: Do not register slave MDIO bus with OF
    (networking-stable-20_04_09).
  o net: dsa: bcm_sf2: Ensure correct sub-node is parsed
    (networking-stable-20_04_09).
  o net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
  o net: dsa: Fix duplicate frames flooded by learning
    (networking-stable-20_03_28).
  o net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
  o net: fec: validate the new settings in fec_enet_set_coalesce()
    (networking-stable-20_03_14).
  o net: fib_rules: Correctly set table field when table number exceeds 8 bits
    (networking-stable-20_03_01).
  o netfilter: connlabels: prefer static lock initialiser (git-fixes).
  o netfilter: conntrack: sctp: use distinct states for new SCTP connections
    (bsc#1159199).
  o netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
  o netfilter: not mark a spinlock as __read_mostly (git-fixes).
  o net: fix race condition in __inet_lookup_established() (bsc#1151794).
  o net: fq: add missing attribute validation for orphan mask
    (networking-stable-20_03_14).
  o net, ip_tunnel: fix interface lookup with no key
    (networking-stable-20_04_02).
  o net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin
    (networking-stable-20_04_17).
  o net: ipv6: do not consider routes via gateways for anycast address check
    (networking-stable-20_04_17).
  o netlink: Use netlink header as base to calculate bad attribute offset
    (networking-stable-20_03_14).
  o net: macsec: update SCI upon MAC address change
    (networking-stable-20_03_14).
  o net: memcg: fix lockdep splat in inet_csk_accept()
    (networking-stable-20_03_14).
  o net: memcg: late association of sock to memcg (networking-stable-20_03_14).
  o net/mlx4_en: avoid indirect call in TX completion
    (networking-stable-20_04_27).
  o net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
  o net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
  o net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
  o net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#
    1171118).
  o net/mlx5: Expose link speed directly (bsc#1171118).
  o net/mlx5: Expose port speed when possible (bsc#1171118).
  o net: mvneta: Fix the case where the last poll did not process all rx
    (networking-stable-20_03_28).
  o net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node
    (networking-stable-20_04_27).
  o net/packet: tpacket_rcv: do not increment ring index on drop
    (networking-stable-20_03_14).
  o net: phy: restore mdio regs in the iproc mdio driver
    (networking-stable-20_03_01).
  o net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
  o net: revert default NAPI poll timeout to 2 jiffies
    (networking-stable-20_04_17).
  o net_sched: cls_route: remove the right filter from hashtable
    (networking-stable-20_03_28).
  o net/smc: add fallback check to connect() (git-fixes).
  o net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).
  o net: vmxnet3: fix possible buffer overflow caused by bad DMA value in
    vmxnet3_get_rss() (bsc#1172484).
  o net/x25: Fix x25_neigh refcnt leak when receiving frame
    (networking-stable-20_04_27).
  o nfc: add missing attribute validation for SE API
    (networking-stable-20_03_14).
  o nfc: add missing attribute validation for vendor subcommand
    (networking-stable-20_03_14).
  o nfc: pn544: Fix occasional HW initialization failure
    (networking-stable-20_03_01).
  o nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
  o nfsd4: fix up replay_matches_cache() (git-fixes).
  o nfsd: Ensure CLONE persists data and metadata changes to the target file
    (git-fixes).
  o nfsd: fix delay timer on 32-bit architectures (git-fixes).
  o nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
  o NFS: Directory page cache pages need to be locked when read (git-fixes).
  o nfsd: memory corruption in nfsd4_lock() (git-fixes).
  o NFS: Do not call generic_error_remove_page() while holding locks (bsc#
    1170457).
  o NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#
    1170592).
  o NFS: Fix memory leaks and corruption in readdir (git-fixes).
  o NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
  o NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
  o NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
  o NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
  o NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
  o NFS: Revalidate the file size on a fatal write error (git-fixes).
  o NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals
    (git-fixes).
  o NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
  o NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
  o NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid()
    (git-fixes).
  o NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
  o NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
  o NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn
    (git-fixes).
  o nl802154: add missing attribute validation for dev_type
    (networking-stable-20_03_14).
  o nl802154: add missing attribute validation (networking-stable-20_03_14).
  o nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#
    1159058).
  o nvme: do not update multipath disk information if the controller is down
    (bcs#1171558 bsc#1159058).
  o nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
  o objtool: Add is_static_jump() helper (bsc#1169514).
  o objtool: Add relocation check for alternative sections (bsc#1169514).
  o objtool: Clean instruction state before each function validation (bsc#
    1169514).
  o objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
  o objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
  o objtool: Ignore empty alternatives (bsc#1169514).
  o objtool: Make BP scratch register warning more robust (bsc#1169514).
  o OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)
  o overflow: Fix -Wtype-limits compilation warnings (git fixes).
  o overflow.h: Add arithmetic shift helper (git fixes).
  o p54usb: add AirVasT USB stick device-id (bsc#1051510).
  o padata: Remove broken queue flushing (git-fixes).
  o Partially revert "kfifo: fix kfifo_alloc() and kfifo_init()" (git fixes
    (block drivers)).
  o PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
  o PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#
    1051510).
  o PCI: Program MPS for RCiEP devices (bsc#1051510).
  o PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port
    (bsc#1051510).
  o perf: Allocate context task_ctx_data for child event (git-fixes).
  o perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
  o perf: Copy parent's address filter offsets on clone (git-fixes).
  o perf/core: Add sanity check to deal with pinned event failure (git-fixes).
  o perf/core: Avoid freeing static PMU contexts when PMU is unregistered
    (git-fixes).
  o perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
  o perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
  o perf/core: Fix crash when using HW tracing kernel filters (git-fixes).
  o perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
  o perf/core: Fix error handling in perf_event_alloc() (git-fixes).
  o perf/core: Fix exclusive events' grouping (git-fixes).
  o perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
  o perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
  o perf/core: Fix locking for children siblings group read (git-fixes).
  o perf/core: Fix perf_event_read_value() locking (git-fixes).
  o perf/core: Fix perf_pmu_unregister() locking (git-fixes).
  o perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
  o perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
  o perf/core: Fix race between close() and fork() (git-fixes).
  o perf/core: Fix the address filtering fix (git-fixes).
  o perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
  o perf/core: Force USER_DS when recording user stack data (git-fixes).
  o perf/core: Restore mmap record type correctly (git-fixes).
  o perf: Fix header.size for namespace events (git-fixes).
  o perf/ioctl: Add check for the sample_period value (git-fixes).
  o perf, pt, coresight: Fix address filters for vmas with non-zero offset
    (git-fixes).
  o perf: Return proper values for user stack errors (git-fixes).
  o perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
  o perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise
    RIP validity (git-fixes).
  o perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
  o perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h)
    (git-fixes).
  o perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static
    (git-fixes).
  o perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3
    PMCs (git-fixes stable).
  o perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
  o perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events
    (git-fixes stable).
  o perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
  o perf/x86: Fix incorrect PEBS_REGS (git-fixes).
  o perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts()
    (git-fixes).
  o perf/x86/intel: Add proper condition to run sched_task callbacks
    (git-fixes).
  o perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
  o perf/x86/intel: Fix PT PMI handling (git-fixes).
  o perf/x86/intel: Move branch tracing setup to the Intel-specific source file
    (git-fixes).
  o perf/x86/intel/uncore: Add Node ID mask (git-fixes).
  o perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
  o perf/x86/uncore: Fix event group support (git-fixes).
  o pid: Improve the comment about waiting in zap_pid_ns_processes (git
    fixes)).
  o pinctrl: baytrail: Enable pin configuration setting for GPIO chip
    (git-fixes).
  o pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler
    (git-fixes).
  o pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()
    ' (bsc#1051510).
  o pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()'
    (bsc#1051510).
  o pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs
    (bsc#1051510).
  o platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#
    1051510).
  o pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors
    (git-fixes).
  o pnp: Use list_for_each_entry() instead of open coding (git fixes).
  o powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
  o powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#
    1065729).
  o powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
  o powerpc/pci/of: Parse unassigned resources (bsc#1065729).
  o powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#
    1065729).
  o powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#
    1065729).
  o powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
  o power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select
    (bsc#1051510).
  o power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe
    ()' (bsc#1051510).
  o power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
  o qede: Fix race between rdma destroy workqueue and link change event
    (networking-stable-20_03_01).
  o r8152: check disconnect status after long sleep
    (networking-stable-20_03_14).
  o raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).
  o raid6/ppc: Fix build for clang (git fixes (block drivers)).
  o rcu: locking and unlocking need to always be at least barriers (git fixes
    (block drivers)).
  o RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
  o RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
  o RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
  o RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
  o README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.
  o Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues" (git
    fixes (block drivers)).
  o Revert "drm/panel: simple: Add support for Sharp LQ150X1LG11 panels" (bsc#
    1114279) * offset changes
  o Revert "ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()"
    (bsc#1172221).
  o Revert "tools lib traceevent: Remove unneeded qsort and uses memmove"
  o rpm/kernel-docs.spec.in: Require python-packaging for build.
  o rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
  o s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
  o s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
  o s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
  o s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
  o s390/diag: fix display of diagnose call statistics (git-fixes).
  o s390: fix syscall_get_error for compat processes (git-fixes).
  o s390/ftrace: fix potential crashes when switching tracers (git-fixes).
  o s390/gmap: return proper error code on ksm unsharing (git-fixes).
  o s390/ism: fix error return code in ism_probe() (git-fixes).
  o s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#
    184103).
  o s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
  o s390/qdio: consistently restore the IRQ handler (git-fixes).
  o s390/qdio: lock device while installing IRQ handler (git-fixes).
  o s390/qdio: put thinint indicator after early error (git-fixes).
  o s390/qdio: tear down thinint indicator after early error (git-fixes).
  o s390/qeth: cancel RX reclaim work earlier (git-fixes).
  o s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
  o s390/qeth: do not warn for napi with 0 budget (git-fixes).
  o s390/qeth: fix error handling for isolation mode cmds (git-fixes).
  o s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
  o s390/qeth: fix promiscuous mode after reset (git-fixes).
  o s390/qeth: fix qdio teardown after early init error (git-fixes).
  o s390/qeth: handle error due to unsupported transport mode (git-fixes).
  o s390/qeth: handle error when backing RX buffer (git-fixes).
  o s390/qeth: lock the card while changing its hsuid (git-fixes).
  o s390/qeth: support net namespaces for L3 devices (git-fixes).
  o s390/time: Fix clk type in get_tod_clock (git-fixes).
  o scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
  o scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
  o scsi: bnx2i: fix potential use after free (bsc#1171600).
  o scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)
    This commit also required: > scsi: core: avoid preallocating big SGL for
    data
  o scsi: core: save/restore command resid for error handling (bsc#1171602).
  o scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
  o scsi: core: try to get module before removing device (bsc#1171605).
  o scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
  o scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
  o scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
  o scsi: fnic: fix invalid stack access (bsc#1171609).
  o scsi: fnic: fix msix interrupt allocation (bsc#1171610).
  o scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#
    1172759 ltc#184814).
  o scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#
    185128).
  o scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
  o scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
  o scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
  o scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences
    (bsc#1171614).
  o scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG
    (bsc#1171615).
  o scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state
    (bsc#1171616).
  o scsi: qedf: Add port_id getter (bsc#1150660).
  o scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
  o scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
  o scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#
    1157169).
  o scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#
    1157169).
  o scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#
    1157169).
  o scsi: qla2xxx: Fix regression warnings (bsc#1157169).
  o scsi: qla2xxx: Remove non functional code (bsc#1157169).
  o scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#
    1158983).
  o scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#
    1157169).
  o scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
  o scsi: qla4xxx: fix double free bug (bsc#1171618).
  o scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI
    (bsc#1171619).
  o scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
  o scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE
    (6) (bsc#1171621).
  o scsi: ufs: change msleep to usleep_range (bsc#1171622).
  o scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path
    (bsc#1171623).
  o scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
  o scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus
    () fails (bsc#1171625).
  o scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
  o scsi: zfcp: fix missing erp_lock in port recovery trigger for
    point-to-point (git-fixes).
  o sctp: fix possibly using a bad saddr with a given dst
    (networking-stable-20_04_02).
  o sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
  o sctp: move the format error check out of __sctp_sf_do_9_1_abort
    (networking-stable-20_03_01).
  o seq_file: fix problem when seeking mid-record (bsc#1170125).
  o serial: uartps: Move the spinlock after the read of the tx empty
    (git-fixes).
  o sfc: detach from cb_page in efx_copy_channel()
    (networking-stable-20_03_14).
  o signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#
    1172185).
  o slcan: not call free_netdev before rtnl_unlock in slcan_open
    (networking-stable-20_03_28).
  o slip: make slhc_compress() more robust against malicious packets
    (networking-stable-20_03_14).
  o smb3: Additional compression structures (bsc#1144333).
  o smb3: Add new compression flags (bsc#1144333).
  o smb3: change noisy error message to FYI (bsc#1144333).
  o smb3: enable swap on SMB3 mounts (bsc#1144333).
  o smb3: Minor cleanup of protocol definitions (bsc#1144333).
  o smb3: remove overly noisy debug line in signing errors (bsc#1144333).
  o smb3: smbdirect support can be configured by default (bsc#1144333).
  o smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
  o spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
  o spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
  o spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
  o spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
  o spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
  o spi: dw: use "smp_mb()" to avoid sending spi data error (bsc#1051510).
  o spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
  o spi: fsl: do not map irq during probe (git-fixes).
  o spi: fsl: use platform_get_irq() instead of of_irq_to_resource()
    (git-fixes).
  o spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
  o spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
  o spi: spi-fsl-dspi: Replace interruptible wait queue with a simple
    completion (git-fixes).
  o spi: spi-s3c64xx: Fix system resume support (git-fixes).
  o spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
  o staging: comedi: dt2815: fix writing hi byte of analog output (bsc#
    1051510).
  o staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#
    1051510).
  o staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
  o staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
  o staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
  o staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default
    (git-fixes).
  o staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
  o staging: vt6656: Fix pairwise key entry save (git-fixes).
  o sunrpc: expiry_time should be seconds not timeval (git-fixes).
  o SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
  o SUNRPC: The TCP back channel mustn't disappear while requests are
    outstanding (bsc#1152624).
  o supported.conf: Add br_netfilter to base (bsc#1169020).
  o svcrdma: Fix leak of transport addresses (git-fixes).
  o taskstats: fix data-race (bsc#1172188).
  o tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
  o tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
  o team: add missing attribute validation for array index
    (networking-stable-20_03_14).
  o team: add missing attribute validation for port ifindex
    (networking-stable-20_03_14).
  o team: fix hang in team_mode_get() (networking-stable-20_04_27).
  o tools lib traceevent: Remove unneeded qsort and uses memmove instead
    (git-fixes).
  o tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
  o tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
  o tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
  o tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
  o tracing: Disable trace_printk() on post poned tests (git-fixes).
  o tracing: Fix event trigger to accept redundant spaces (git-fixes).
  o tracing: Fix the race between registering 'snapshot' event trigger and
    triggering 'snapshot' operation (git-fixes).
  o tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
  o tty: n_gsm: Fix SOF skipping (bsc#1051510).
  o tty: n_gsm: Fix waking up upper tty layer when room available (bsc#
    1051510).
  o tty: rocket, avoid OOB access (git-fixes).
  o UAS: fix deadlock in error handling and PM flushing work (git-fixes).
  o UAS: no use logging any details in case of ENODEV (git-fixes).
  o USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70
    RGB RAPIDFIRE (git-fixes).
  o USB: cdc-acm: restore capability check order (git-fixes).
  o USB: core: Fix misleading driver bug report (bsc#1051510).
  o USB: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#
    1051510).
  o USB: dwc3: do not set gadget->is_otg flag (git-fixes).
  o USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
  o USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
  o USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset()
    (git-fixes).
  o USB: gadget: audio: Fix a missing error return value in audio_bind()
    (git-fixes).
  o USB: gadget: composite: Inform controller driver of self-powered
    (git-fixes).
  o USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
  o USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
  o USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
  o USB: gadget: lpc32xx_udc: do not dereference ep pointer before null check
    (bsc#1051510).
  o USB: gadget: net2272: Fix a memory leak in an error handling path in
    'net2272_plat_probe()' (git-fixes).
  o USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
  o USB: gadget: udc: atmel: Make some symbols static (git-fixes).
  o USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete
    (git-fixes).
  o USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in
    s3c2410_udc_nuke (bsc#1051510).
  o USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#
    1051510).
  o USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
  o USB: hub: Fix handling of connect changes during sleep (git-fixes).
  o USB: musb: Fix runtime PM imbalance on error (bsc#1051510).
  o USB: musb: start session in resume for host port (bsc#1051510).
  o usbnet: silence an unnecessary warning (bsc#1170770).
  o USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
  o USB: serial: option: add BroadMobi BM806U (git-fixes).
  o USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
  o USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
  o USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
  o USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
  o USB: serial: qcserial: Add DW5816e support (git-fixes).
  o USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#
    1051510).
  o USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
  o USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
  o USB-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
  o USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
  o USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg
    list (git-fixes).
  o video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#
    1114279)
  o video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
  o virtio-blk: handle block_device_operations callbacks after hot unplug (git
    fixes (block drivers)).
  o vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
  o vmxnet3: add support to get/set rx flow hash (bsc#1172484).
  o vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
  o vmxnet3: avoid format strint overflow warning (bsc#1172484).
  o vmxnet3: prepare for version 4 changes (bsc#1172484).
  o vmxnet3: Remove always false conditional statement (bsc#1172484).
  o vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
  o vmxnet3: remove unused flag "rxcsum" from struct vmxnet3_adapter (bsc#
    1172484).
  o vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
  o vmxnet3: update to version 4 (bsc#1172484).
  o vmxnet3: use correct hdr reference when packet is encapsulated (bsc#
    1172484).
  o vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
  o vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
  o vt: selection, introduce vc_is_sel (git-fixes).
  o vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
  o vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
  o vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
    (git-fixes).
  o vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
  o w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#
    1051510).
  o watchdog: reset last_hw_keepalive time at start (git-fixes).
  o wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
  o wil6210: remove reset file from debugfs (git-fixes).
  o wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
  o work around mvfs bug (bsc#1162063).
  o workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#
    1172130).
  o x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
  o x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
  o x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
  o x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
  o x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
  o x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS
    (git-fixes).
  o x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
  o x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
  o x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#
    1170618).
  o x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#
    1170618).
  o x86/Hyper-V: Report crash register data or kmsg before running crash kernel
    (bsc#1170618).
  o x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not
    set (bsc#1170618).
  o x86/Hyper-V: report value of misc_features (git-fixes).
  o x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc
    #1170618).
  o x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
  o x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
  o x86/{mce,mm}: Unmap the entire page if the whole page is affected and
    poisoned (bsc#1172257).
  o x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
  o x86/resctrl: Fix invalid attempt at removing the default resource group
    (git-fixes).
  o x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
  o x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#
    1058115).
  o x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
  o x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
  o x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc
    #1058115).
  o x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
  o x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
  o x86/xen: fix booting 32-bit pv guest (bsc#1071995).
  o x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
  o x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
  o xen/pci: reserve MCFG areas earlier (bsc#1170145).
  o xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish
    (networking-stable-20_04_27).
  o xfrm: fix error in comment (git fixes).
  o xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
  o xfs: do not ever return a stale pointer from __xfs_dir3_free_read
    (git-fixes).
  o xprtrdma: Fix completion wait during device removal (git-fixes).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Real Time Extension 12-SP4:
    zypper in -t patch SUSE-SLE-RT-12-SP4-2020-2156=1

Package List:

  o SUSE Linux Enterprise Real Time Extension 12-SP4 (x86_64):
       cluster-md-kmp-rt-4.12.14-8.23.1
       dlm-kmp-rt-4.12.14-8.23.1
       gfs2-kmp-rt-4.12.14-8.23.1
       kernel-rt-4.12.14-8.23.1
       kernel-rt-base-4.12.14-8.23.1
       kernel-rt-devel-4.12.14-8.23.1
       kernel-rt_debug-devel-4.12.14-8.23.1
       kernel-syms-rt-4.12.14-8.23.1
       ocfs2-kmp-rt-4.12.14-8.23.1
  o SUSE Linux Enterprise Real Time Extension 12-SP4 (noarch):
       kernel-devel-rt-4.12.14-8.23.1
       kernel-source-rt-4.12.14-8.23.1


References:

  o https://www.suse.com/security/cve/CVE-2018-1000199.html
  o https://www.suse.com/security/cve/CVE-2019-16746.html
  o https://www.suse.com/security/cve/CVE-2019-19462.html
  o https://www.suse.com/security/cve/CVE-2019-20806.html
  o https://www.suse.com/security/cve/CVE-2019-20810.html
  o https://www.suse.com/security/cve/CVE-2019-20812.html
  o https://www.suse.com/security/cve/CVE-2019-9455.html
  o https://www.suse.com/security/cve/CVE-2020-0543.html
  o https://www.suse.com/security/cve/CVE-2020-10690.html
  o https://www.suse.com/security/cve/CVE-2020-10711.html
  o https://www.suse.com/security/cve/CVE-2020-10720.html
  o https://www.suse.com/security/cve/CVE-2020-10732.html
  o https://www.suse.com/security/cve/CVE-2020-10751.html
  o https://www.suse.com/security/cve/CVE-2020-10757.html
  o https://www.suse.com/security/cve/CVE-2020-10766.html
  o https://www.suse.com/security/cve/CVE-2020-10767.html
  o https://www.suse.com/security/cve/CVE-2020-10768.html
  o https://www.suse.com/security/cve/CVE-2020-10769.html
  o https://www.suse.com/security/cve/CVE-2020-10773.html
  o https://www.suse.com/security/cve/CVE-2020-12114.html
  o https://www.suse.com/security/cve/CVE-2020-12464.html
  o https://www.suse.com/security/cve/CVE-2020-12652.html
  o https://www.suse.com/security/cve/CVE-2020-12653.html
  o https://www.suse.com/security/cve/CVE-2020-12654.html
  o https://www.suse.com/security/cve/CVE-2020-12655.html
  o https://www.suse.com/security/cve/CVE-2020-12656.html
  o https://www.suse.com/security/cve/CVE-2020-12657.html
  o https://www.suse.com/security/cve/CVE-2020-12769.html
  o https://www.suse.com/security/cve/CVE-2020-12888.html
  o https://www.suse.com/security/cve/CVE-2020-13143.html
  o https://www.suse.com/security/cve/CVE-2020-13974.html
  o https://www.suse.com/security/cve/CVE-2020-14416.html
  o https://bugzilla.suse.com/1051510
  o https://bugzilla.suse.com/1058115
  o https://bugzilla.suse.com/1065729
  o https://bugzilla.suse.com/1071995
  o https://bugzilla.suse.com/1082555
  o https://bugzilla.suse.com/1085030
  o https://bugzilla.suse.com/1089895
  o https://bugzilla.suse.com/1104967
  o https://bugzilla.suse.com/1111666
  o https://bugzilla.suse.com/1114279
  o https://bugzilla.suse.com/1133021
  o https://bugzilla.suse.com/1144333
  o https://bugzilla.suse.com/1148868
  o https://bugzilla.suse.com/1150660
  o https://bugzilla.suse.com/1151794
  o https://bugzilla.suse.com/1152107
  o https://bugzilla.suse.com/1152489
  o https://bugzilla.suse.com/1152624
  o https://bugzilla.suse.com/1154824
  o https://bugzilla.suse.com/1157169
  o https://bugzilla.suse.com/1158265
  o https://bugzilla.suse.com/1158983
  o https://bugzilla.suse.com/1159058
  o https://bugzilla.suse.com/1159199
  o https://bugzilla.suse.com/1160388
  o https://bugzilla.suse.com/1160947
  o https://bugzilla.suse.com/1161016
  o https://bugzilla.suse.com/1162002
  o https://bugzilla.suse.com/1162063
  o https://bugzilla.suse.com/1165183
  o https://bugzilla.suse.com/1165741
  o https://bugzilla.suse.com/1166969
  o https://bugzilla.suse.com/1167574
  o https://bugzilla.suse.com/1167851
  o https://bugzilla.suse.com/1168081
  o https://bugzilla.suse.com/1168503
  o https://bugzilla.suse.com/1168670
  o https://bugzilla.suse.com/1169020
  o https://bugzilla.suse.com/1169194
  o https://bugzilla.suse.com/1169514
  o https://bugzilla.suse.com/1169525
  o https://bugzilla.suse.com/1169625
  o https://bugzilla.suse.com/1169795
  o https://bugzilla.suse.com/1170011
  o https://bugzilla.suse.com/1170056
  o https://bugzilla.suse.com/1170125
  o https://bugzilla.suse.com/1170145
  o https://bugzilla.suse.com/1170345
  o https://bugzilla.suse.com/1170457
  o https://bugzilla.suse.com/1170522
  o https://bugzilla.suse.com/1170592
  o https://bugzilla.suse.com/1170618
  o https://bugzilla.suse.com/1170620
  o https://bugzilla.suse.com/1170770
  o https://bugzilla.suse.com/1170778
  o https://bugzilla.suse.com/1170791
  o https://bugzilla.suse.com/1170901
  o https://bugzilla.suse.com/1171078
  o https://bugzilla.suse.com/1171098
  o https://bugzilla.suse.com/1171118
  o https://bugzilla.suse.com/1171124
  o https://bugzilla.suse.com/1171189
  o https://bugzilla.suse.com/1171191
  o https://bugzilla.suse.com/1171195
  o https://bugzilla.suse.com/1171202
  o https://bugzilla.suse.com/1171205
  o https://bugzilla.suse.com/1171217
  o https://bugzilla.suse.com/1171218
  o https://bugzilla.suse.com/1171219
  o https://bugzilla.suse.com/1171220
  o https://bugzilla.suse.com/1171293
  o https://bugzilla.suse.com/1171417
  o https://bugzilla.suse.com/1171424
  o https://bugzilla.suse.com/1171527
  o https://bugzilla.suse.com/1171558
  o https://bugzilla.suse.com/1171599
  o https://bugzilla.suse.com/1171600
  o https://bugzilla.suse.com/1171601
  o https://bugzilla.suse.com/1171602
  o https://bugzilla.suse.com/1171604
  o https://bugzilla.suse.com/1171605
  o https://bugzilla.suse.com/1171606
  o https://bugzilla.suse.com/1171607
  o https://bugzilla.suse.com/1171608
  o https://bugzilla.suse.com/1171609
  o https://bugzilla.suse.com/1171610
  o https://bugzilla.suse.com/1171611
  o https://bugzilla.suse.com/1171612
  o https://bugzilla.suse.com/1171613
  o https://bugzilla.suse.com/1171614
  o https://bugzilla.suse.com/1171615
  o https://bugzilla.suse.com/1171616
  o https://bugzilla.suse.com/1171617
  o https://bugzilla.suse.com/1171618
  o https://bugzilla.suse.com/1171619
  o https://bugzilla.suse.com/1171620
  o https://bugzilla.suse.com/1171621
  o https://bugzilla.suse.com/1171622
  o https://bugzilla.suse.com/1171623
  o https://bugzilla.suse.com/1171624
  o https://bugzilla.suse.com/1171625
  o https://bugzilla.suse.com/1171626
  o https://bugzilla.suse.com/1171673
  o https://bugzilla.suse.com/1171679
  o https://bugzilla.suse.com/1171691
  o https://bugzilla.suse.com/1171694
  o https://bugzilla.suse.com/1171695
  o https://bugzilla.suse.com/1171736
  o https://bugzilla.suse.com/1171761
  o https://bugzilla.suse.com/1171868
  o https://bugzilla.suse.com/1171904
  o https://bugzilla.suse.com/1171948
  o https://bugzilla.suse.com/1171949
  o https://bugzilla.suse.com/1171951
  o https://bugzilla.suse.com/1171952
  o https://bugzilla.suse.com/1171982
  o https://bugzilla.suse.com/1171983
  o https://bugzilla.suse.com/1172096
  o https://bugzilla.suse.com/1172097
  o https://bugzilla.suse.com/1172098
  o https://bugzilla.suse.com/1172099
  o https://bugzilla.suse.com/1172101
  o https://bugzilla.suse.com/1172102
  o https://bugzilla.suse.com/1172103
  o https://bugzilla.suse.com/1172104
  o https://bugzilla.suse.com/1172127
  o https://bugzilla.suse.com/1172130
  o https://bugzilla.suse.com/1172185
  o https://bugzilla.suse.com/1172188
  o https://bugzilla.suse.com/1172199
  o https://bugzilla.suse.com/1172221
  o https://bugzilla.suse.com/1172253
  o https://bugzilla.suse.com/1172257
  o https://bugzilla.suse.com/1172317
  o https://bugzilla.suse.com/1172342
  o https://bugzilla.suse.com/1172343
  o https://bugzilla.suse.com/1172344
  o https://bugzilla.suse.com/1172366
  o https://bugzilla.suse.com/1172391
  o https://bugzilla.suse.com/1172397
  o https://bugzilla.suse.com/1172453
  o https://bugzilla.suse.com/1172458
  o https://bugzilla.suse.com/1172484
  o https://bugzilla.suse.com/1172759
  o https://bugzilla.suse.com/1172775
  o https://bugzilla.suse.com/1172781
  o https://bugzilla.suse.com/1172782
  o https://bugzilla.suse.com/1172783
  o https://bugzilla.suse.com/1172999
  o https://bugzilla.suse.com/1173265
  o https://bugzilla.suse.com/1173280
  o https://bugzilla.suse.com/1173428
  o https://bugzilla.suse.com/1173462
  o https://bugzilla.suse.com/1173659


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:2152-1
Rating:            important
References:        #1065729 #1146351 #1149652 #1152457 #1162002 #1164910
                   #1170011 #1170618 #1171078 #1171189 #1171191 #1171220
                   #1171732 #1171988 #1172453 #1172458 #1172775 #1172999
                   #1173280 #1173658 #1174115 #1174462 #1174543
Cross-References:  CVE-2019-20810 CVE-2019-20812 CVE-2020-0305 CVE-2020-10135
                   CVE-2020-10711 CVE-2020-10732 CVE-2020-10751 CVE-2020-10773
                   CVE-2020-12771 CVE-2020-13974 CVE-2020-14416
Affected Products:
                   SUSE OpenStack Cloud Crowbar 8
                   SUSE OpenStack Cloud 8
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP3-BCL
                   SUSE Linux Enterprise High Availability 12-SP3
                   SUSE Enterprise Storage 5
                   HPE Helion Openstack 8
______________________________________________________________________________

An update that solves 11 vulnerabilities and has 12 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security
and bugfixes.

The following security bugs were fixed:

  o CVE-2020-10135: Legacy pairing and secure-connections pairing
    authentication in Bluetooth may have allowed an unauthenticated user to
    complete authentication without pairing credentials via adjacent access. An
    unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR
    master or slave to pair with a previously paired remote device to
    successfully complete the authentication procedure without knowing the link
    key (bnc#1171988).
  o CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux
    subsystem. This flaw occurs while importing the Commercial IP Security
    Option (CIPSO) protocol's category bitmap into the SELinux extensible
    bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote
    network user to crash the system kernel, resulting in a denial of service
    (bnc#1171191).
  o CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation,
    where it incorrectly assumed that an skb would only contain a single
    netlink message. The hook would incorrectly only validate the first netlink
    message in the skb and allow or deny the rest of the messages within the
    skb with the granted permission without further processing (bnc#1171189).
  o CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo()
    function in net/packet/af_packet.c can result in a denial of service (CPU
    consumption and soft lockup) in a certain failure case involving
    TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
  o CVE-2020-10732: A flaw was found in the implementation of userspace core
    dumps. This flaw allowed an attacker with a local account to crash a
    trivial program and exfiltrate private kernel data (bnc#1171220).
  o CVE-2020-0305: In cdev_get of char_dev.c, there is a possible
    use-after-free due to a race condition. This could lead to local escalation
    of privilege with System execution privileges needed. User interaction is
    not needed for exploitation (bnc#1174462).
  o CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a
    deadlock if a coalescing operation fails (bnc#1171732).
  o CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed
    (bnc#1172999).
  o CVE-2020-14416: A race condition in tty->disc_data handling in the slip and
    slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824.
    This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#
    1162002).
  o CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if
    k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#
    1172775).
  o CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in
    the Linux kernel did not call snd_card_free for a failure path, which
    causes a memory leak, aka CID-9453264ef586 (bnc#1172458).


The following non-security bugs were fixed:

  o Drivers: hv: Change flag to write log level in panic msg to false (bsc#
    1170618).
  o ibmvnic: Do not process device remove during device reset (bsc#1065729).
  o ibmvnic: Do not process reset during or after device removal (bsc#1149652
    ltc#179635).
  o ibmvnic: Flush existing work items before device removal (bsc#1065729).
  o ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
  o ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#
    184239).
  o ibmvnic: Unmap DMA address of TX descriptor buffers after use (bsc#1146351
    ltc#180726).
  o ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#
    185369).
  o intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
  o mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#
    1164910).
  o net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).
  o net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#
    179635).
  o net/ibmvnic: prevent more than one thread from running in reset (bsc#
    1152457 ltc#174432).
  o net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#
    1152457 ltc#174432).
  o udp: drop corrupt packets earlier to avoid data corruption (bsc#1173658).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-2152=1
  o SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2020-2152=1
  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-2152=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-2152=1
  o SUSE Linux Enterprise Server 12-SP3-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-2152=1
  o SUSE Linux Enterprise High Availability 12-SP3:
    zypper in -t patch SUSE-SLE-HA-12-SP3-2020-2152=1
  o SUSE Enterprise Storage 5:
    zypper in -t patch SUSE-Storage-5-2020-2152=1
  o HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2020-2152=1

Package List:

  o SUSE OpenStack Cloud Crowbar 8 (x86_64):
       kernel-default-4.4.180-94.127.1
       kernel-default-base-4.4.180-94.127.1
       kernel-default-base-debuginfo-4.4.180-94.127.1
       kernel-default-debuginfo-4.4.180-94.127.1
       kernel-default-debugsource-4.4.180-94.127.1
       kernel-default-devel-4.4.180-94.127.1
       kernel-default-kgraft-4.4.180-94.127.1
       kernel-syms-4.4.180-94.127.1
       kgraft-patch-4_4_180-94_127-default-1-4.3.1
       kgraft-patch-4_4_180-94_127-default-debuginfo-1-4.3.1
  o SUSE OpenStack Cloud Crowbar 8 (noarch):
       kernel-devel-4.4.180-94.127.1
       kernel-macros-4.4.180-94.127.1
       kernel-source-4.4.180-94.127.1
  o SUSE OpenStack Cloud 8 (noarch):
       kernel-devel-4.4.180-94.127.1
       kernel-macros-4.4.180-94.127.1
       kernel-source-4.4.180-94.127.1
  o SUSE OpenStack Cloud 8 (x86_64):
       kernel-default-4.4.180-94.127.1
       kernel-default-base-4.4.180-94.127.1
       kernel-default-base-debuginfo-4.4.180-94.127.1
       kernel-default-debuginfo-4.4.180-94.127.1
       kernel-default-debugsource-4.4.180-94.127.1
       kernel-default-devel-4.4.180-94.127.1
       kernel-default-kgraft-4.4.180-94.127.1
       kernel-syms-4.4.180-94.127.1
       kgraft-patch-4_4_180-94_127-default-1-4.3.1
       kgraft-patch-4_4_180-94_127-default-debuginfo-1-4.3.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
       kernel-default-4.4.180-94.127.1
       kernel-default-base-4.4.180-94.127.1
       kernel-default-base-debuginfo-4.4.180-94.127.1
       kernel-default-debuginfo-4.4.180-94.127.1
       kernel-default-debugsource-4.4.180-94.127.1
       kernel-default-devel-4.4.180-94.127.1
       kernel-default-kgraft-4.4.180-94.127.1
       kernel-syms-4.4.180-94.127.1
       kgraft-patch-4_4_180-94_127-default-1-4.3.1
       kgraft-patch-4_4_180-94_127-default-debuginfo-1-4.3.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):
       kernel-devel-4.4.180-94.127.1
       kernel-macros-4.4.180-94.127.1
       kernel-source-4.4.180-94.127.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
       kernel-default-4.4.180-94.127.1
       kernel-default-base-4.4.180-94.127.1
       kernel-default-base-debuginfo-4.4.180-94.127.1
       kernel-default-debuginfo-4.4.180-94.127.1
       kernel-default-debugsource-4.4.180-94.127.1
       kernel-default-devel-4.4.180-94.127.1
       kernel-syms-4.4.180-94.127.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):
       kernel-default-kgraft-4.4.180-94.127.1
       kgraft-patch-4_4_180-94_127-default-1-4.3.1
       kgraft-patch-4_4_180-94_127-default-debuginfo-1-4.3.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):
       kernel-devel-4.4.180-94.127.1
       kernel-macros-4.4.180-94.127.1
       kernel-source-4.4.180-94.127.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (s390x):
       kernel-default-man-4.4.180-94.127.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
       kernel-default-4.4.180-94.127.1
       kernel-default-base-4.4.180-94.127.1
       kernel-default-base-debuginfo-4.4.180-94.127.1
       kernel-default-debuginfo-4.4.180-94.127.1
       kernel-default-debugsource-4.4.180-94.127.1
       kernel-default-devel-4.4.180-94.127.1
       kernel-syms-4.4.180-94.127.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (noarch):
       kernel-devel-4.4.180-94.127.1
       kernel-macros-4.4.180-94.127.1
       kernel-source-4.4.180-94.127.1
  o SUSE Linux Enterprise High Availability 12-SP3 (ppc64le s390x x86_64):
       cluster-md-kmp-default-4.4.180-94.127.1
       cluster-md-kmp-default-debuginfo-4.4.180-94.127.1
       dlm-kmp-default-4.4.180-94.127.1
       dlm-kmp-default-debuginfo-4.4.180-94.127.1
       gfs2-kmp-default-4.4.180-94.127.1
       gfs2-kmp-default-debuginfo-4.4.180-94.127.1
       kernel-default-debuginfo-4.4.180-94.127.1
       kernel-default-debugsource-4.4.180-94.127.1
       ocfs2-kmp-default-4.4.180-94.127.1
       ocfs2-kmp-default-debuginfo-4.4.180-94.127.1
  o SUSE Enterprise Storage 5 (aarch64 x86_64):
       kernel-default-4.4.180-94.127.1
       kernel-default-base-4.4.180-94.127.1
       kernel-default-base-debuginfo-4.4.180-94.127.1
       kernel-default-debuginfo-4.4.180-94.127.1
       kernel-default-debugsource-4.4.180-94.127.1
       kernel-default-devel-4.4.180-94.127.1
       kernel-syms-4.4.180-94.127.1
  o SUSE Enterprise Storage 5 (noarch):
       kernel-devel-4.4.180-94.127.1
       kernel-macros-4.4.180-94.127.1
       kernel-source-4.4.180-94.127.1
  o SUSE Enterprise Storage 5 (x86_64):
       kernel-default-kgraft-4.4.180-94.127.1
       kgraft-patch-4_4_180-94_127-default-1-4.3.1
       kgraft-patch-4_4_180-94_127-default-debuginfo-1-4.3.1
  o HPE Helion Openstack 8 (noarch):
       kernel-devel-4.4.180-94.127.1
       kernel-macros-4.4.180-94.127.1
       kernel-source-4.4.180-94.127.1
  o HPE Helion Openstack 8 (x86_64):
       kernel-default-4.4.180-94.127.1
       kernel-default-base-4.4.180-94.127.1
       kernel-default-base-debuginfo-4.4.180-94.127.1
       kernel-default-debuginfo-4.4.180-94.127.1
       kernel-default-debugsource-4.4.180-94.127.1
       kernel-default-devel-4.4.180-94.127.1
       kernel-default-kgraft-4.4.180-94.127.1
       kernel-syms-4.4.180-94.127.1
       kgraft-patch-4_4_180-94_127-default-1-4.3.1
       kgraft-patch-4_4_180-94_127-default-debuginfo-1-4.3.1


References:

  o https://www.suse.com/security/cve/CVE-2019-20810.html
  o https://www.suse.com/security/cve/CVE-2019-20812.html
  o https://www.suse.com/security/cve/CVE-2020-0305.html
  o https://www.suse.com/security/cve/CVE-2020-10135.html
  o https://www.suse.com/security/cve/CVE-2020-10711.html
  o https://www.suse.com/security/cve/CVE-2020-10732.html
  o https://www.suse.com/security/cve/CVE-2020-10751.html
  o https://www.suse.com/security/cve/CVE-2020-10773.html
  o https://www.suse.com/security/cve/CVE-2020-12771.html
  o https://www.suse.com/security/cve/CVE-2020-13974.html
  o https://www.suse.com/security/cve/CVE-2020-14416.html
  o https://bugzilla.suse.com/1065729
  o https://bugzilla.suse.com/1146351
  o https://bugzilla.suse.com/1149652
  o https://bugzilla.suse.com/1152457
  o https://bugzilla.suse.com/1162002
  o https://bugzilla.suse.com/1164910
  o https://bugzilla.suse.com/1170011
  o https://bugzilla.suse.com/1170618
  o https://bugzilla.suse.com/1171078
  o https://bugzilla.suse.com/1171189
  o https://bugzilla.suse.com/1171191
  o https://bugzilla.suse.com/1171220
  o https://bugzilla.suse.com/1171732
  o https://bugzilla.suse.com/1171988
  o https://bugzilla.suse.com/1172453
  o https://bugzilla.suse.com/1172458
  o https://bugzilla.suse.com/1172775
  o https://bugzilla.suse.com/1172999
  o https://bugzilla.suse.com/1173280
  o https://bugzilla.suse.com/1173658
  o https://bugzilla.suse.com/1174115
  o https://bugzilla.suse.com/1174462
  o https://bugzilla.suse.com/1174543

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=aDZy
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/10/esb-2020-2739-suse-linux-kernel-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2739-suse-linux-kernel-multiple-vulnerabilities

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...