Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
Please login to access the resource
openSUSE:Step:FrontRunner
patchinfo.24593
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.24593
<patchinfo incident="24593"> <issue id="1028340" tracker="bnc">BUG at ../drivers/scsi/device_handler/scsi_dh_alua.c:659 in SAS fail/unfail test</issue> <issue id="1065729" tracker="bnc">[trackerbug] 4.12 powerpc base kernel fixes</issue> <issue id="1071995" tracker="bnc">[TRACKERBUG] SLE15 livepatch backports</issue> <issue id="1158266" tracker="bnc">VUL-0: CVE-2019-19377: kernel-source: mounting a crafted btrfs filesystem image can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c</issue> <issue id="1177282" tracker="bnc">VUL-1: CVE-2020-26541: kernel-source: Forbidden Signature Database (aka dbx) protection mechanism is not properly enforced</issue> <issue id="1191647" tracker="bnc">VUL-0: CVE-2021-20321: kernel-source,kernel-source-rt,kernel-source-azure: kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename()</issue> <issue id="1195651" tracker="bnc">net: mana: Add handling of CQE_RX_TRUNCATED</issue> <issue id="1195926" tracker="bnc">kernel-obs-build without systemd fails to start</issue> <issue id="1196114" tracker="bnc">Migration to 15 SP1 can't remove old kernel and modules</issue> <issue id="1196367" tracker="bnc">swapon process occasionally blocks - Need core analyzed</issue> <issue id="1196426" tracker="bnc">VUL-0: CVE-2021-33061: kernel-source-azure,kernel-source-rt,kernel-source: Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters results in denial of service</issue> <issue id="1196433" tracker="bnc">SLES 15 SP1 LPAR - sluggish I/O and device unit timeouts with vPMEM assigned</issue> <issue id="1196514" tracker="bnc">Unable to update from SLES-12-SP5 to SLES-15-SP1</issue> <issue id="1196570" tracker="bnc">L3: NFS -- old ACCESS reply info is not being flushed (NFS attribute cache)</issue> <issue id="1196942" tracker="bnc">[Build 101.1] openQA test fails in await_install - kernel-default-4.12.14-122.113.1.s390x: erase failed</issue> <issue id="1197157" tracker="bnc">After patching server CIFS mount to a Windows Share unable to copy files.</issue> <issue id="1197343" tracker="bnc">VUL-0: CVE-2022-1011: kernel-source-azure,kernel-source-rt,kernel-source: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes</issue> <issue id="1197472" tracker="bnc">VUL-1: CVE-2022-0168: kernel-source,kernel-source-rt,kernel-source-azure: smb2_ioctl_query_info NULL Pointer Dereference</issue> <issue id="1197656" tracker="bnc">Longhorn and its Backing image feature doesn't work if /var/lib/longhorn is stored on DASD with EXT4</issue> <issue id="1197660" tracker="bnc">VUL-0: CVE-2022-1158: kernel-source: cmpxchg_gpte mishandles VM_IO|VM_PFNMAP page</issue> <issue id="1197895" tracker="bnc">Corosync is taking all of the two CPU allocated to the Guest</issue> <issue id="1198330" tracker="bnc">VUL-0: CVE-2022-28893: kernel-source: Linux kernel: Use after free in SUNRPC subsystem</issue> <issue id="1198400" tracker="bnc">VUL-0: kernel: save/restore speculative MSRs during S3 suspend/resume</issue> <issue id="1198484" tracker="bnc">Regression in kernel-obs-build update 5.3.18-150300.59.60.4</issue> <issue id="1198516" tracker="bnc">VUL-0: CVE-2022-1353: kernel-source: information leak issue in pfkey_register in net/key/af_key.c</issue> <issue id="1198577" tracker="bnc">VUL-0: CVE-2022-1184: kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image</issue> <issue id="1198660" tracker="bnc">Request SUSE to pick up this kernel upstream patch in SLES 15 3, SLES 15 SP 2 and SLES 12 SP 5 releases to fix a potential drmgr add/remove crash issue</issue> <issue id="1198687" tracker="bnc">[EAR - NOT FOR USA Citizens] PTF requests fo kernel fixing CVE-2022-1011 in SLES11 SP3 LTSS– Core</issue> <issue id="1198778" tracker="bnc">Backport ENA driver for 15 SP2 kernel</issue> <issue id="1198825" tracker="bnc">L3: kernel BUG at ../drivers/scsi/device_handler/scsi_dh_alua.c:668 - ref:_00D1igLOd._5005q4TbAL:ref</issue> <issue id="1199012" tracker="bnc">VUL-0: CVE-2022-1516: kernel-source-rt,kernel-source,kernel-source-azure: null-ptr-deref caused by x25_disconnect</issue> <issue id="1199063" tracker="bnc">VUL-0: CVE-2022-1652: kernel-source,kernel-source-rt,kernel-source-azure: We found a concurrency use-after-free in bad_flp_intr for latest kernel version</issue> <issue id="1199314" tracker="bnc">[Azure] PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time</issue> <issue id="1199505" tracker="bnc">VUL-0: CVE-2022-30594: kernel-source,kernel-source-azure,kernel-source-rt: mishandled seccomp permissions</issue> <issue id="1199507" tracker="bnc">VUL-0: CVE-2022-1729: kernel-source: kernel/core: race condition in perf_event_open leads to privilege escalation</issue> <issue id="1199605" tracker="bnc">VUL-0: CVE-2022-1734: kernel-source,kernel-source-azure,kernel-source-rt: Use-After-Free in NFC driver in nfcmrvl_nci_unregister_dev when simulating NFC device from user-space</issue> <issue id="1199650" tracker="bnc">VUL-0: EMBARGOED: CVE-2022-21166, CVE-2022-21127, CVE-2022-21123, CVE-2022-21125, CVE-2022-21180: kernel: stale MMIO data transient information leaks (INTEL-TA-00615)</issue> <issue id="1199918" tracker="bnc">SLE15-SP2: ping -I on link local address is failing with ping: sendmsg: Invalid argument</issue> <issue id="1200015" tracker="bnc">VUL-0: CVE-2022-1966: kernel: use-after-free in the netfilter subsystem</issue> <issue id="1200143" tracker="bnc">VUL-0: CVE-2022-1975: kernel-source,kernel-source-azure,kernel-source-rt: sleep in atomic bug when firmware download timeout</issue> <issue id="1200144" tracker="bnc">VUL-0: CVE-2022-1974: kernel-source-rt,kernel-source,kernel-source-azure: use-after-free in /net/nfc/core.c causes kernel crash by simulating nfc device from user-space</issue> <issue id="1200249" tracker="bnc">SLE15-SP3/armv7l/lpae: NEW WARNINGS (4c788136)</issue> <issue id="2022-1966" tracker="cve" /> <issue id="2022-1975" tracker="cve" /> <issue id="2022-1974" tracker="cve" /> <issue id="2020-26541" tracker="cve" /> <issue id="2019-19377" tracker="cve" /> <issue id="2022-21166" tracker="cve" /> <issue id="2022-21127" tracker="cve" /> <issue id="2022-21123" tracker="cve" /> <issue id="2022-21125" tracker="cve" /> <issue id="2022-21180" tracker="cve" /> <issue id="2022-1729" tracker="cve" /> <issue id="2022-1184" tracker="cve" /> <issue id="2022-1652" tracker="cve" /> <issue id="2022-1734" tracker="cve" /> <issue id="2022-30594" tracker="cve" /> <issue id="2022-0168" tracker="cve" /> <issue id="2021-33061" tracker="cve" /> <issue id="2022-1516" tracker="cve" /> <issue id="2021-20321" tracker="cve" /> <issue id="2022-1158" tracker="cve" /> <issue id="2022-1353" tracker="cve" /> <issue id="2022-28893" tracker="cve" /> <issue id="2022-1011" tracker="cve" /> <issue id="SLE-18234" tracker="jsc" /> <category>security</category> <rating>important</rating> <packager>jdelvare</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP2 kernel was updated. The following security bugs were fixed: - CVE-2022-0168: Fixed a NULL pointer dereference in smb2_ioctl_query_info. (bsc#1197472) - CVE-2022-1966: Fixed an use-after-free bug in the netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015) - CVE-2022-28893: Ensuring that sockets are in the intended state inside the SUNRPC subsystem (bnc#1198330). - CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1197660). - CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143) - CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144) - CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bnc#1177282) - CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266) - CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507). - CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577) - CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063). - CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605) - CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505). - CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426). - CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012). - CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647). - CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516) - CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343) The following non-security bugs were fixed: - btrfs: tree-checker: fix incorrect printk format (bsc#1200249). - cifs: fix bad fids sent over wire (bsc#1197157). - direct-io: clean up error paths of do_blockdev_direct_IO (bsc#1197656). - direct-io: defer alignment check until after the EOF check (bsc#1197656). - direct-io: do not force writeback for reads beyond EOF (bsc#1197656). - net: ena: A typo fix in the file ena_com.h (bsc#1198778). - net: ena: Add capabilities field with support for ENI stats capability (bsc#1198778). - net: ena: Add debug prints for invalid req_id resets (bsc#1198778). - net: ena: add device distinct log prefix to files (bsc#1198778). - net: ena: add jiffies of last napi call to stats (bsc#1198778). - net: ena: aggregate doorbell common operations into a function (bsc#1198778). - net: ena: aggregate stats increase into a function (bsc#1198778). - net: ena: Change ENI stats support check to use capabilities field (bsc#1198778). - net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1198778). - net: ena: Change the name of bad_csum variable (bsc#1198778). - net: ena: Extract recurring driver reset code into a function (bsc#1198778). - net: ena: fix coding style nits (bsc#1198778). - net: ena: fix DMA mapping function issues in XDP (bsc#1198778). - net: ena: Fix error handling when calculating max IO queues number (bsc#1198778). - net: ena: fix inaccurate print type (bsc#1198778). - net: ena: Fix undefined state when tx request id is out of bounds (bsc#1198778). - net: ena: Fix wrong rx request id by resetting device (bsc#1198778). - net: ena: Improve error logging in driver (bsc#1198778). - net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1198778). - net: ena: introduce XDP redirect implementation (bsc#1198778). - net: ena: make symbol 'ena_alloc_map_page' static (bsc#1198778). - net: ena: Move reset completion print to the reset function (bsc#1198778). - net: ena: optimize data access in fast-path code (bsc#1198778). - net: ena: re-organize code to improve readability (bsc#1198778). - net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198778). - net: ena: remove extra words from comments (bsc#1198778). - net: ena: Remove module param and change message severity (bsc#1198778). - net: ena: Remove rcu_read_lock() around XDP program invocation (bsc#1198778). - net: ena: Remove redundant return code check (bsc#1198778). - net: ena: Remove unused code (bsc#1198778). - net: ena: store values in their appropriate variables types (bsc#1198778). - net: ena: Update XDP verdict upon failure (bsc#1198778). - net: ena: use build_skb() in RX path (bsc#1198778). - net: ena: use constant value for net_device allocation (bsc#1198778). - net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198778). - net: ena: use xdp_frame in XDP TX flow (bsc#1198778). - net: ena: use xdp_return_frame() to free xdp frames (bsc#1198778). - net: mana: Add counter for packet dropped by XDP (bsc#1195651). - net: mana: Add counter for XDP_TX (bsc#1195651). - net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651). - net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651). - net: mana: Reuse XDP dropped page (bsc#1195651). - net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651). - NFS: limit use of ACCESS cache for negative responses (bsc#1196570). - PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314). - ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1199918). - ping: remove pr_err from ping_lookup (bsc#1199918). - powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449). - powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449). - powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803). - sched/rt: Disable RT_RUNTIME_SHARE by default (bnc#1197895). - scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825). - SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367). - video: hyperv_fb: Fix validation of screen resolution (git-fixes). - x86/pm: Save the MSR validity status at context setup (bsc#1198400). - x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1198400). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor