Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.25168
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.25168
<patchinfo incident="25168"> <issue id="1114648" tracker="bnc">[TRACKERBUG] git-fixes pile for SLE12</issue> <issue id="1194013" tracker="bnc">VUL-0: CVE-2021-4157: kernel-source-azure,kernel-source-rt,kernel-source: Buffer overwrite in decode_nfs_fh function</issue> <issue id="1195478" tracker="bnc">[PATCH] fsnotify: invalidate dcache before IN_DELETE event</issue> <issue id="1195775" tracker="bnc">apparmor fails to build with 5.16.7</issue> <issue id="1196472" tracker="bnc">SLES 15 SP2 - SAP HANA on POWER ML4 workload with vpmem configured shows significant degradation (performance) (SCM/pmem)</issue> <issue id="1196901" tracker="bnc">VUL-0: CVE-2022-23960,CVE-2022-0001,CVE-2022-0002,CVE-2021-26341,CVE-2021-26401: xen: Multiple speculative security issues (XSA-398)</issue> <issue id="1197362" tracker="bnc">L3: RIP: 0010:update_writeback_rate+0x1d0/0x310 [bcache]</issue> <issue id="1198829" tracker="bnc">VUL-0: CVE-2022-1462: kernel-source,kernel-source-rt,kernel-source-azure: A race condition vulnerability in drivers/tty/tty_buffers.c</issue> <issue id="1199487" tracker="bnc">VUL-0: CVE-2022-1679: kernel-source,kernel-source-rt,kernel-source-azure: kernel: Use-After-Free in ath9k_htc_probe_device() could cause an escalation of privileges</issue> <issue id="1199489" tracker="bnc">vmxnet3: update to latest ToT</issue> <issue id="1199647" tracker="bnc">VUL-0: CVE-2022-1116: kernel-source-azure,kernel-source-rt,kernel-source: Integer overflow in io_uring may lead to local privilege escalation</issue> <issue id="1199648" tracker="bnc">VUL-0: CVE-2022-1116: kernel live patch: Integer overflow in io_uring may lead to local privilege escalation</issue> <issue id="1199657" tracker="bnc">VUL-0: EMBARGOED: CVE-2022-29900 CVE-2022-29901: kernel: RETBLEED speculative issue</issue> <issue id="1200263" tracker="bnc">Partner-L3: I/O request allocation is stuck for more than 120 seconds</issue> <issue id="1200442" tracker="bnc">kernel-install-tools should be recommended by all kernel-source flavors</issue> <issue id="1200571" tracker="bnc">execve() incorrectly handles empty argv array</issue> <issue id="1200599" tracker="bnc">VUL-0: CVE-2022-20154: kernel-source,kernel-source-rt,kernel-source-azure: race condition leading to use-after-free in lock_sock_nested</issue> <issue id="1200604" tracker="bnc">VUL-0: CVE-2022-20141: kernel-source-azure,kernel-source,kernel-source-rt: use after free in ip_check_mc_rcu()</issue> <issue id="1200605" tracker="bnc">VUL-0: CVE-2022-20141: kernel live patch: use after free in ip_check_mc_rcu()</issue> <issue id="1200608" tracker="bnc">VUL-0: CVE-2022-20154: kernel live patch: race condition leading to use-after-free in lock_sock_nested</issue> <issue id="1200619" tracker="bnc">VUL-0: CVE-2022-20132: kernel-source-rt,kernel-source-azure,kernel-source: several potential out of bounds reads via malicious HID device</issue> <issue id="1200692" tracker="bnc">VUL-0: CVE-2022-33981: kernel-source-rt,kernel-source-azure,kernel-source: use-after-free in floppy driver</issue> <issue id="1200762" tracker="bnc">VUL-0: CVE-2022-26365,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742: xen: Linux disk/nic frontends data leaks (XSA-403)</issue> <issue id="1200905" tracker="bnc">Missing patch for inotify IN_DELETE regression</issue> <issue id="1200910" tracker="bnc">VUL-0: CVE-2020-36558: kernel: use after free due to race condition between ioctl(VT_DISALLOCATE) and ioctl(VT_RESIZEX)</issue> <issue id="1201050" tracker="bnc">VUL-0: CVE-2021-26341: kernel: straight line speculation on x86</issue> <issue id="1201080" tracker="bnc">VUL-0: CVE-2022-1679: kernel live patch: kernel: Use-After-Free in ath9k_htc_probe_device() could cause an escalation of privileges</issue> <issue id="1201251" tracker="bnc">VUL-0: CVE-2022-2318: kernel-source,kernel-source-rt,kernel-source-azure: Use-after-free caused by timer handler in net/rose/rose_timer.c</issue> <issue id="1201429" tracker="bnc">VUL-0: CVE-2020-36557: kernel use after free due to race condition in ioctl(VT_DISALLOCATE)</issue> <issue id="1201458" tracker="bnc">VUL-0: CVE-2022-21505: kernel lockdown bypass via IMA appraisal</issue> <issue id="1201635" tracker="bnc">VUL-0: CVE-2021-33655: kernel-source,kernel-source-azure,kernel-source-rt: Out of bounds write with ioctl cmd FBIOPUT_VSCREENINFO</issue> <issue id="1201636" tracker="bnc">VUL-0: CVE-2021-33656: kernel-source-azure,kernel-source,kernel-source-rt: When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds</issue> <issue id="1201644" tracker="bnc">Kernel crashes on Dell PowerEdge R340 and R440 after latest kernel upgrade</issue> <issue id="1201664" tracker="bnc">kernel 5.3.18-150300.59.81-default is continuously crashing on Supermicro X11DPU-Z+ (Intel Skylake SP)</issue> <issue id="1201672" tracker="bnc">bad RIP value - kernel NULL pointer dereference address 0000000000000000</issue> <issue id="1201673" tracker="bnc">L3: buggy kernel 5.3.18-150300.59.81 on SLES15-SP3 keeps crashing</issue> <issue id="1201676" tracker="bnc">crashes on new 15-sp3 kernel (retbleed fallout?)</issue> <issue id="1201742" tracker="bnc">VUL-0: CVE-2020-36557: kernel live patch: use after free due to race condition in ioctl(VT_DISALLOCATE)</issue> <issue id="1201752" tracker="bnc">VUL-0: CVE-2020-36558: kernel live patch: use after free due to race condition between ioctl(VT_DISALLOCATE) and ioctl(VT_RESIZEX)</issue> <issue id="1201930" tracker="bnc">Regression running some VM guests with 5.3.18-150300.59.87.1</issue> <issue id="1201940" tracker="bnc">VUL-0: CVE-2022-36946: kernel-source-azure,kernel-source,kernel-source-rt: incorrect packet truncation in nfqnl_mangle() leads to remote DoS</issue> <issue id="2020-36557" tracker="cve" /> <issue id="2020-36558" tracker="cve" /> <issue id="2021-4157" tracker="cve" /> <issue id="2021-26341" tracker="cve" /> <issue id="2021-33655" tracker="cve" /> <issue id="2021-33656" tracker="cve" /> <issue id="2022-1116" tracker="cve" /> <issue id="2022-1462" tracker="cve" /> <issue id="2022-1679" tracker="cve" /> <issue id="2022-2318" tracker="cve" /> <issue id="2022-20132" tracker="cve" /> <issue id="2022-20141" tracker="cve" /> <issue id="2022-20154" tracker="cve" /> <issue id="2022-21505" tracker="cve" /> <issue id="2022-26365" tracker="cve" /> <issue id="2022-29900" tracker="cve" /> <issue id="2022-29901" tracker="cve" /> <issue id="2022-33740" tracker="cve" /> <issue id="2022-33741" tracker="cve" /> <issue id="2022-33742" tracker="cve" /> <issue id="2022-33981" tracker="cve" /> <issue id="2022-36946" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <description>The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free (bnc#1201429). - CVE-2020-36558: Fixed a race condition involving VT_RESIZEX which could lead to a NULL pointer dereference and general protection fault (bnc#1200910). - CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013). - CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050). - CVE-2021-33655: Fixed memory out of bounds write by ioctl cmd FBIOPUT_VSCREENINFO (bnc#1201635). - CVE-2021-33656: Fixed memory out of bounds write related to ioctl cmd PIO_FONT (bnc#1201636). - CVE-2022-1116: Fixed a integer overflow vulnerability in io_uring which allowed a local attacker to cause memory corruption and escalate privileges to root (bnc#1199647). - CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem. This flaw allowed a local user to crash the system or read unauthorized random data from memory. (bnc#1198829) - CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487). - CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251). - CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619). - CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604). - CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599). - CVE-2022-21505: Fixed kexec lockdown bypass with ima policy (bsc#1201458). - CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762). - CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657). - CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692) - CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940). The following non-security bugs were fixed: - bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362). - blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263). - blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263). - blk-mq: fix tag_get wait task can't be awakened (bsc#1200263). - dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278). - dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278). - dma-mapping: add a dma_ops_bypass flag to struct device (bsc#1196472 ltc#192278). - dma-mapping: move the remaining DMA API calls out of line (bsc#1196472 ltc#192278). - dma: kABI: Add back removed exports (bsc#1196472 ltc#192278). - exec: Force single empty string when argv is empty (bsc#1200571). - fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478 bsc#1200905). - kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930). - kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930). - powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). - powerpc/pseries/iommu: Create defines for operations in ibm, ddw-applicable (bsc#1196472 ltc#192278). - powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278). - powerpc/pseries/iommu: Update call to ibm, query-pe-dma-windows (bsc#1196472 ltc#192278). - powerpc: dma: kABI workaround for moving around dma_bypass bit (bsc#1196472 ltc#192278). - powerpc: use the generic dma_ops_bypass mode (bsc#1196472 ltc#192278). - vmxnet3: fix minimum vectors alloc issue (bsc#1199489). - x86/bugs: Remove apostrophe typo (bsc#1114648). - x86/entry: Remove skip_r11rcx (bsc#1201644). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor