The SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
CVE-2018-20855: An issue was discovered in createqpcommon, mlx5ibcreateqpresp was never initialized, resulting in a leak of stack memory to userspace. (bnc#bsc#1103991)
CVE-2019-1125: Fix Spectre V1 variant via swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allowed a denial of service by setupformatparams division-by-zero. (bnc#bsc#1143189)
CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. (bsc#1143191)
CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference can occur when megasascreateframepool() fails in megasasalloccmds() in drivers/scsi/megaraid/megaraidsas_base.c. This causes a Denial of Service, related to a use-after-free. (bsc#1134399)
CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)
CVE-2019-13631: In parsehidreport_descriptor, a malicious usb device could send an hid: report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)