Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.6:Update
patchinfo.32068
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.32068
<patchinfo incident="32068"> <issue id="1179610" tracker="bnc">VUL-0: CVE-2020-26558: kernel-source: Multiple Bluetooth Core Specification Vulnerabilities</issue> <issue id="1183045" tracker="bnc">mount command hangs on reserved scsi disk</issue> <issue id="1193285" tracker="bnc">[Build 67.2] io_pgetevents_time64 returns an event when max_nr == -1 (32bit compatibility layer)</issue> <issue id="1211162" tracker="bnc">[ppc64le] kernel BUG at ../fs/nfs/pagelist.c:530! Oops: Exception in kernel mode, sig: 5 [#1]</issue> <issue id="1211226" tracker="bnc">Eliminate the need for 'OBS source links': convert to _multibuild</issue> <issue id="1212584" tracker="bnc">Missing SPI fixes for NVIDIA Grace platform</issue> <issue id="1214747" tracker="bnc">L3: SLES15 SP5: LUNs going into "failed" state is observed on >1T with DIF enabled on array</issue> <issue id="1214823" tracker="bnc">SLE-15SP5 KOTD: Kernel warning in nfsd_file_cache_purge()</issue> <issue id="1215237" tracker="bnc">VUL-0: CVE-2020-26555: kernel-source-rt,kernel-source,kernel-source-azure,bluez: Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of t</issue> <issue id="1215696" tracker="bnc">Bug in SNC when nr_cpus=<fewer cpus than present></issue> <issue id="1215885" tracker="bnc">L3: clocksource / TSC found unstable after boot, possibly due to broken bios</issue> <issue id="1216057" tracker="bnc">SLES15SP5 - MPIO is waiting for stalled tur thread to finish</issue> <issue id="1216559" tracker="bnc">SLES 15 SP5 cannot boot with SEV SNP flags enabled for Amazon EC2 instances</issue> <issue id="1216776" tracker="bnc">L3: kvm - qla2xxx IO errors and aborts in the host cause multipath failed devices in the guest</issue> <issue id="1217036" tracker="bnc">[SLES 15 SP5] BUG: scheduling while atomic, occurring after a warning in ring_buffer_discard_commit()</issue> <issue id="1217217" tracker="bnc">L3: tsc: Marking TSC unstable due to clocksource watchdog</issue> <issue id="1217250" tracker="bnc">VUL-0: CVE-2023-6121: kernel-source,kernel-source-azure,kernel-source-rt: kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get()</issue> <issue id="1217602" tracker="bnc">L3-Question: kernel crash while printing (module) symbols in OOM stack trace</issue> <issue id="1217692" tracker="bnc">frequent repeated nlmsvc_put_lockowner+0x6 panics — ref:_00D1igLOd._500Tr1SJiH:ref</issue> <issue id="1217790" tracker="bnc">Bug in SNC when nr_cpus=<fewer cpus than present></issue> <issue id="1217801" tracker="bnc">PVT:1050:XM: CT: Suse Lpar not able to do ssh after Fatal EEH Injection using 4 port ethernet adapter ( 14E4 1657 1014 0420 ) on d153-linux2 lpar</issue> <issue id="1217933" tracker="bnc">KVM: s390: vsie: fix wrong VIR 37 when MSO is used</issue> <issue id="1217938" tracker="bnc">VUL-0: CVE-2023-6622: kernel: null pointer dereference vulnerability in nft_dynset_init()</issue> <issue id="1217946" tracker="bnc">VUL-0: CVE-2023-6610: kernel: OOB Access in smb2_dump_detail</issue> <issue id="1217947" tracker="bnc">VUL-0: CVE-2023-6606: kernel: Out-Of-Bounds Read vulnerability in smbCalcSize</issue> <issue id="1217980" tracker="bnc">ceph: fix incorrect revoked caps assert in ceph_fill_file_size()</issue> <issue id="1217981" tracker="bnc">libceph: use kernel_connect()</issue> <issue id="1217982" tracker="bnc">ceph: fix type promotion bug on 32bit systems</issue> <issue id="1218056" tracker="bnc">KVM: s390/mm: Properly reset no-dat</issue> <issue id="1218139" tracker="bnc">SLES 15 SP5 - SMC stats: Wrong bucket calculation for payload of exactly 4096 bytes</issue> <issue id="1218184" tracker="bnc">Eliminate the need for 'OBS source links': convert to _multibuild</issue> <issue id="1218234" tracker="bnc">Adjust insufficient default bpf_jit_limit (SLE Micro 5.4/Elemental)</issue> <issue id="1218253" tracker="bnc">VUL-0: CVE-2023-6932: kernel: use-after-free in IPv4 IGMP</issue> <issue id="1218258" tracker="bnc">VUL-0: CVE-2023-6931: kernel: heap out-of-bounds write in perf_read_group</issue> <issue id="1218335" tracker="bnc">VUL-0: CVE-2023-6546: kernel-source,kernel-source-azure,kernel-source-rt: GSM multiplexing race condition leads to privilege escalation</issue> <issue id="1218357" tracker="bnc">s390/vx: fix save/restore of fpu kernel context</issue> <issue id="1218447" tracker="bnc">VUL-0: CVE-2023-6531: kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF</issue> <issue id="1218515" tracker="bnc">mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors</issue> <issue id="1218559" tracker="bnc">VUL-0: CVE-2023-51779: kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg</issue> <issue id="1218569" tracker="bnc">SLE-15SP4 KOTD: Kernel warning in nfsd_file_cache_purge()</issue> <issue id="1218659" tracker="bnc">fuse: dax: set fc->dax to NULL in fuse_dax_conn_free()</issue> <issue id="2023-6531" tracker="cve" /> <issue id="2023-6610" tracker="cve" /> <issue id="2023-51779" tracker="cve" /> <issue id="2020-26555" tracker="cve" /> <issue id="2023-6606" tracker="cve" /> <issue id="2023-6546" tracker="cve" /> <issue id="2023-6931" tracker="cve" /> <issue id="2023-6932" tracker="cve" /> <issue id="2023-6622" tracker="cve" /> <issue id="2023-6121" tracker="cve" /> <issue id="PED-3459" tracker="jsc" /> <issue id="PED-5021" tracker="jsc" /> <issue id="PED-7322" tracker="jsc" /> <category>security</category> <rating>important</rating> <packager>mfranc</packager> <reboot_needed/> <description>The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). - CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). - CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). - CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). - CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). - CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). - CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258). - CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). - CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). - CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). The following non-security bugs were fixed: - Reviewed and added more information to README.SUSE (jsc#PED-5021). - Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). - Drop drm/bridge lt9611uxc patches that have been reverted on stable trees - KVM: s390/mm: Properly reset no-dat (bsc#1218056). - KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933). - KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322). - NFS: Fix O_DIRECT locking issues (bsc#1211162). - NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). - NFS: Fix a potential data corruption (bsc#1211162). - NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162). - NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162). - NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162). - NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). - NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162). - NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). - Updated SPI patches for NVIDIA Grace enablement (bsc#1212584 jsc#PED-3459) - block: fix revalidate performance regression (bsc#1216057). - bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234). - ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). - ceph: fix type promotion bug on 32bit systems (bsc#1217982). - clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). - clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). - clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). - clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). - clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). - clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). - clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). - clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). - dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). - fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659). - libceph: use kernel_connect() (bsc#1217981). - mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). - net/smc: Fix pos miscalculation in statistics (bsc#1218139). - net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). - nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). - remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). - s390/vx: fix save/restore of fpu kernel context (bsc#1218357). - scsi: lpfc: use unsigned type for num_sge (bsc#1214747). - swiotlb: fix a braino in the alignment check fix (bsc#1216559). - swiotlb: fix slot alignment checks (bsc#1216559). - tracing: Disable preemption when using the filter buffer (bsc#1217036). - tracing: Fix a possible race when disabling buffered events (bsc#1217036). - tracing: Fix a warning when allocating buffered events fails (bsc#1217036). - tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). - tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). - tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). - uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). - vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). - x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). - x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). - x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). - x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). - x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor