|
Bugzilla – Full Text Bug Listing |
| Summary: | nouveau modeset: Kernel panic | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Distribution | Reporter: | Vinzenz Vietzke <vinz> |
| Component: | Kernel | Assignee: | E-mail List <kernel-maintainers> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | nwr10cst-oslnx, patrik.jakobsson, sndirsch, snwint, tiwai, tzimmermann, vinz |
| Version: | Leap 15.1 | ||
| Target Milestone: | --- | ||
| Hardware: | x86-64 | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | 1123523 | ||
| Bug Blocks: | |||
| Attachments: |
Screen shot just before freeze
hwinfo of xp15 kernel panic with i915.modeset=0 on leap 15.1 dmesg-xp15 |
||
|
Description
Vinzenz Vietzke
2019-01-29 15:47:57 UTC
This sounds like this bug and bug #1123523 are really the same problem. Did this work with previous builds on that same hardware? If you can boot any of the previous builds (or any not too old SUSE distro), can you please attach the output of "hwinfo" from any of those builds? Notice that we had recent problems with Chrome and Bugzilla attachments (investigating); if you experience similar problems, please try Firefox. I'll comment on this, instead of starting a new bug report. I am seeing different symptoms, but it might be the same bug. I have two Leap 15.1 systems on KVM virtual machines. I have updated both this morning, using "zypper dup". Now neither will boot. The update should be to build 402.2. Some more detail: Machine 1: The KVM machine name is "tw32efi" and and I am booting it with UEFI (32-bit UEFI, but that's a long story and probably not relevant). On normal booting, I see the Plymouth screen. And then that partially fades out. The system freezes at that point, and I have to force off. If I put "plymouth.enable=0" on the kernel boot line, it still freezes. If I put a "3" at the end of the kernel boot line, it successfully boots to multi-user mode. In multi-user mode, if I try "telinit 5" to go to GUI mode, it freezes. So it looks as if there's a problem with X. Machine 2: The KVM machine name is "Leap 15.1", and it uses legacy booting from MBR. I'm not sure that the kernel is even loading. Or, if it is loading, it does not get very far. After forcing off, I booted to a Tumbleweed DVD in rescue mode. And "fsck" showed that the file systems were still clean. So boot had not proceeded very far at all. For both machines, I can boot without problems to the previous kernel "4.12.14-lp151.19-default". But I have the problems that I have described if I boot to "4.12.14-lp151.20-default". Other differences between the two machines: The main difference seems to be this. Machine "tw32efi" is configured to use "virtio" video, while machine "Leap 15.1" is configured to use "QXL" video. As a test, I reconfigured the "Leap 15.1" virtual machine to use "virtio" video. And now the kernel clearly loads and boot starts, but it freezes at about the same point as the other virtual machine. If I boot from the TW DVD in rescue mode, I see that both root and home partitions are dirty but "fsck" can recover from journal. I should mention that I am using "ext4" on both systems. Some further tests. With the KVM machine named "Leap 15.1", and still using "virtio" video, I am able to boot kernel 4.12.14-lp151.20-default to run level 3 (by appending " 3" to the grub "linux" command. However, after switching back to QXL video, booting fails early, as if the kernel does not fully load or it freezes shortly after kernel load. I am doubting that this is the same as bug 1123523 because I think that was for the previous kernel. Created attachment 795546 [details]
Screen shot just before freeze
The attached screenshot is the last thing that I see before the screen blanks and the system appears to freeze. This was with QXL video, and booting the installer DVD to installation mode. It appears to be the same booting the rescue system (again with QXL video).
When booting the installer with "virtio" video, the last thing that I see is a line something like "Searching for a terminal" -- I think think that's just before trying to start Xorg.
(In reply to Stefan Hundhammer from comment #1) > Did this work with previous builds on that same hardware? I haven't tried with earlier 15.1 builds but with 15.0 it *somehow* works, see below. > If you can boot any of the previous builds (or any not too old SUSE distro), > can you please attach the output of "hwinfo" from any of those builds? Here's the thing: We preinstall Leap 15.0 on this machine not via ISO but via FAI (fai-project.org). I tried with the latest ISO which froze just like the Leap 15.1 builds. So I ran our FAI based installation which worked and pulled out hwinfo. Created attachment 795601 [details]
hwinfo of xp15
*** Bug 1123523 has been marked as a duplicate of this bug. *** This looks like there's again a nouveau driver problem. If you boot with 'nomodeset' does it work better? Looks like an Optimus laptop (Intel/NVIDIA GPU combo). So could even be an Intel driver problem. Could be verified via options (only set one per run!) i915.modeset=0 nouveau.modeset=0 instead of option 'nomodeset'. And 80863E9B is already Coffeelake ... (In reply to Stefan Dirsch from comment #10) > i915.modeset=0 > nouveau.modeset=0 > > instead of option 'nomodeset'. nomodeset gave the same results with my tries yesterday. Leap 15.0 + nouveau.modeset=0: works Leap 15.0 + i915.modeset=0: freeze Leap 15.1 Build402.2 + nouveau.modeset=0: works (and scales fine, btw. woohoo!) Leap 15.1 Build402.2 + i915.modeset=0: kernel panic So, yes, this seems to be a problem with nouveau. Ok. nouveau: freeze --> kernel panic. So not so much difference compared to Leap 15.0. Could you please attach the kernel panic output? Possibly it's related to our backport of DRM 4.19 sources to Kernel 4.12. A question. My comments to this bug -- c#3 to c#5 -- are not in any way related to nouveau. If this bug is to be about a nouveau issue, I suppose that I should start a new bug report for the issues that I reported. Advice wanted here. (In reply to Neil Rickert from comment #15) > A question. > > My comments to this bug -- c#3 to c#5 -- are not in any way related to > nouveau. If this bug is to be about a nouveau issue, I suppose that I > should start a new bug report for the issues that I reported. > > Advice wanted here. You're right. This needs to be addressed separately in a separate bugreport. (In reply to Stefan Dirsch from comment #14) > Could you please attach the kernel panic output? Possibly it's related to > our backport of DRM 4.19 sources to Kernel 4.12. Attached. Hopefully it's somewhat readable... Created attachment 795633 [details]
kernel panic with i915.modeset=0 on leap 15.1
Thanks! Hm, something wrong with the runtime PM. Please try to boot with nouveau.runpm=0 boot option. This is sub-optimal, but let's see whether it works around the stall. Yes, it looks like the Nouveau driver tries to access hardware registers that is powered off. This usually causes a freeze on the running cpu thread. But I don't know why this is happening. (In reply to Takashi Iwai from comment #20) > Please try to boot with nouveau.runpm=0 boot option. This is sub-optimal, > but let's see whether it works around the stall. Yes, that worked flawlessly. Any logs I should collect? OK, could you check whether this option makes with i915 enabled, too? (In reply to Takashi Iwai from comment #23) > OK, could you check whether this option makes with i915 enabled, too? I'm not sure what you mean, but: i915.modeset=0 nouveau.runpm=0 => works i915.modeset=1 nouveau.runpm=0 => works (In reply to Patrik Jakobsson from comment #21) > Yes, it looks like the Nouveau driver tries to access hardware registers > that is powered off. This usually causes a freeze on the running cpu thread. > But I don't know why this is happening. As far as I understand, this is a stall in the loop of nvkm_msec() reading the register. It should have been timed out, but the GPU timer itself seems stalling, hence it spins forever. The upstream seems to have a GPU timer stall check in the commit e4f90a35c9668f8d0469a0160482b1856d07c2b5, so this might help for avoiding such a complete hangup, at least. I'm going to build a test kernel including this fix. A test kernel is being built in OBS home:tiwai:bsc1123538 repo. It'll take some time (an hour or so) until the build finishes, and will appear at http://download.opensuse.org/repositories/home:/tiwai:/bsc1123538/standard/ Please give it a try and check whether the stall can be avoided even without runpm=0 option. Thanks for your help! But how can I pull in this kernel build into the ISO I'm booting from? It's not meant for ISO but just for testing on the already installed system. Once when it's confirmed to help, I'll merge it to kernel branch, so that the fixed kernel will be included in the release. That worked! What I did was: - boot Build402.2 ISO with manually added nouveau.runpm=0 - regular installation - boot installed (suspectedly with nouveau.runpm=0) - upgraded the kernel to your test version - removed nouveau.runpm=0 from GRUB config - rebooted OK, that's good to hear. Could you give the dmesg output from the patched kernel? I pushed the fix to SLE15 branch now, since this bug hits also Leap 15.0 as well. This will be merged into SLE15-SP1 / Leap 15.0 branch eventually later. Created attachment 795799 [details]
dmesg-xp15
(In reply to Takashi Iwai from comment #30) > OK, that's good to hear. Could you give the dmesg output from the patched > kernel? > > I pushed the fix to SLE15 branch now, since this bug hits also Leap 15.0 as > well. This will be merged into SLE15-SP1 / Leap 15.0 branch eventually > later. Sure thing. Thank you very much for your help! Thanks, the log looks clean. The fix will be included in Leap 15.1 kernel soon later, and please keep using my test kernel until then. The KVM virtio issue is a completely different problem and it's already fixed. Let's close the bug now. This is an autogenerated message for OBS integration: This bug (1123538) was mentioned in https://build.opensuse.org/request/show/674163 15.0 / kernel-source openSUSE-SU-2019:0203-1: An update that solves 6 vulnerabilities and has 61 fixes is now available. Category: security (important) Bug References: 1046306,1050252,1051510,1054610,1055121,1056658,1056662,1084216,1086301,1086313,1086314,1086323,1087082,1087092,1098382,1098425,1104353,1106105,1106434,1106811,1108870,1109695,1110705,1111666,1113712,1113722,1114279,1117155,1118338,1118505,1119086,1119766,1120318,1120758,1120854,1120902,1120954,1120955,1121599,1121726,1121973,1122019,1122324,1122554,1122662,1122779,1122885,1122927,1122944,1122971,1123061,1123317,1123348,1123357,1123538,1123697,1123933,1124204,1124579,1124589,1124728,1124732,1124735,1124969,1124985,1125109,802154 CVE References: CVE-2018-20669,CVE-2019-3459,CVE-2019-3460,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222 Sources used: openSUSE Leap 15.0 (src): kernel-debug-4.12.14-lp150.12.48.1, kernel-default-4.12.14-lp150.12.48.1, kernel-docs-4.12.14-lp150.12.48.1, kernel-kvmsmall-4.12.14-lp150.12.48.1, kernel-obs-build-4.12.14-lp150.12.48.1, kernel-obs-qa-4.12.14-lp150.12.48.1, kernel-source-4.12.14-lp150.12.48.1, kernel-syms-4.12.14-lp150.12.48.1, kernel-vanilla-4.12.14-lp150.12.48.1 SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178
CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1
SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178
CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1
SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
SUSE Linux Enterprise Live Patching 12-SP4 (src): kgraft-patch-SLE12-SP4_Update_3-1-6.7.1
SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:0767-1: An update that solves 12 vulnerabilities and has 205 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122159,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126284,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127081,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127577,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128378,1128451,1128895,1129016,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,828192
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Server 12-SP4 (src): kernel-azure-4.12.14-6.9.1, kernel-source-azure-4.12.14-6.9.1, kernel-syms-azure-4.12.14-6.9.1
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:0767-1: An update that solves 12 vulnerabilities and has 205 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122159,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126284,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127081,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127577,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128378,1128451,1128895,1129016,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,828192
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Server 12-SP4 (src): kernel-azure-4.12.14-6.9.1, kernel-source-azure-4.12.14-6.9.1, kernel-syms-azure-4.12.14-6.9.1
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:0784-1: An update that solves 12 vulnerabilities and has 197 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1117108,1117155,1117645,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,824948
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 15 (src): kernel-default-4.12.14-150.14.2
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): kernel-default-4.12.14-150.14.2, kernel-docs-4.12.14-150.14.1, kernel-obs-qa-4.12.14-150.14.2
SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.14.2, kernel-livepatch-SLE15_Update_9-1-1.9.3
SUSE Linux Enterprise Module for Legacy Software 15 (src): kernel-default-4.12.14-150.14.2
SUSE Linux Enterprise Module for Development Tools 15 (src): kernel-docs-4.12.14-150.14.1, kernel-obs-build-4.12.14-150.14.2, kernel-source-4.12.14-150.14.1, kernel-syms-4.12.14-150.14.1, kernel-vanilla-4.12.14-150.14.2
SUSE Linux Enterprise Module for Basesystem 15 (src): kernel-default-4.12.14-150.14.2, kernel-source-4.12.14-150.14.1, kernel-zfcpdump-4.12.14-150.14.2
SUSE Linux Enterprise High Availability 15 (src): kernel-default-4.12.14-150.14.2
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:0784-1: An update that solves 12 vulnerabilities and has 197 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1117108,1117155,1117645,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,824948
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.14.2, kernel-livepatch-SLE15_Update_9-1-1.9.3
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:0785-1: An update that solves 12 vulnerabilities and has 198 fixes is now available.
Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1117108,1117155,1117645,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127578,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,824948
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15 (src): kernel-azure-4.12.14-5.24.1, kernel-source-azure-4.12.14-5.24.1, kernel-syms-azure-4.12.14-5.24.1
*** NOTE: This information is not intended to be used for external
communication, because this may only be a partial fix.
If you have questions please reach out to maintenance coordination.
|