Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP2:Update
patchinfo.23134
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.23134
<patchinfo incident="23134"> <issue id="1107207" tracker="bnc">kernel-azure: Rebase HV drivers from 4.18 for October 2018 quarterly release</issue> <issue id="1185973" tracker="bnc">Decreased network connectivity in SP1 compared to SP2?</issue> <issue id="1191580" tracker="bnc">VUL-0: EMBARGOED: CVE-2022-0001, CVE-2022-0002: kernel: BHB speculation issues</issue> <issue id="1194516" tracker="bnc">VUL-0: CVE-2022-0487: kernel: moxart-mmc: use-after-free in moxart_remove</issue> <issue id="1195536" tracker="bnc">L3: Broken hv-pci module on kernel-default-4.12.14-95.83</issue> <issue id="1195543" tracker="bnc">VUL-0: CVE-2022-0492: kernel-source: cgroups v1 release_agent missing capabilities check</issue> <issue id="1195612" tracker="bnc">VUL-0: CVE-2022-24448: kernel-source,kernel-source-rt,kernel-source-azure: nfs_atomic_open() returns uninitialized data instead of ENOTDIR</issue> <issue id="1195840" tracker="bnc">SLES12 SP5 - AF_ALG AES multiple threads test make the system unresponsive [Regression]</issue> <issue id="1195897" tracker="bnc">VUL-0: CVE-2022-24959: kernel-source-azure,kernel-source,kernel-source-rt: memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c</issue> <issue id="1195908" tracker="bnc">VUL-0: CVE-2022-0492: kernel live patch: cgroups v1 release_agent missing capabilities check</issue> <issue id="1195949" tracker="bnc">VUL-0: CVE-2022-0487: kernel live patch: moxart-mmc: use-after-free in moxart_remove</issue> <issue id="1195987" tracker="bnc">VUL-0: CVE-2021-44879: kernel-source-azure,kernel-source,kernel-source-rt: NULL pointer dereference in folio_mark_dirty() via a crafted f2fs image</issue> <issue id="1196079" tracker="bnc">VUL-0: CVE-2022-0617: kernel-source,kernel-source-rt,kernel-source-azure: udf: Null pointer dereference can be triggered when writing to an ICB inode</issue> <issue id="1196155" tracker="bnc">VUL-0: CVE-2022-0644: kernel-source-azure,kernel-source,kernel-source-rt: Assertion failure can happen if users trigger kernel_read_file_from_fd()</issue> <issue id="1196584" tracker="bnc">VUL-0: EMBARGOED kernel-source: overwrite data in arbitrary (read-only) files until 5.16.11</issue> <issue id="1196612" tracker="bnc">[EAR - NOT FOR USA Citizens] PTF request to fix kernel for CVE-2022-0492 for sles12sp2 ref:_00D1igLOd._5001iqBMTa:ref</issue> <issue id="2022-0001" tracker="cve" /> <issue id="2022-0002" tracker="cve" /> <issue id="2022-0617" tracker="cve" /> <issue id="2022-0644" tracker="cve" /> <issue id="2021-44879" tracker="cve" /> <issue id="2022-24959" tracker="cve" /> <issue id="2022-0487" tracker="cve" /> <issue id="2022-0492" tracker="cve" /> <issue id="2022-24448" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>tabraham1</packager> <reboot_needed/> <description>The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes. Transient execution side-channel attacks attacking the Branch History Buffer (BHB), named "Branch Target Injection" and "Intra-Mode Branch History Injection" are now mitigated. The following security bugs were fixed: - CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580). - CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580). - CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079) - CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155). - CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987). - CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897). - CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516). - CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543). - CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612). The following non-security bugs were fixed: - crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840). - hv_netvsc: fix network namespace issues with VF support (bsc#1107207). - hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207). - lib/iov_iter: initialize "flags" in new pipe_buffer (bsc#1196584). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor