Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.25296
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.25296
<patchinfo incident="25296"> <issue id="1195775" tracker="bnc">apparmor fails to build with 5.16.7</issue> <issue id="1195926" tracker="bnc">kernel-obs-build without systemd fails to start</issue> <issue id="1198484" tracker="bnc">Regression in kernel-obs-build update 5.3.18-150300.59.60.4</issue> <issue id="1198829" tracker="bnc">VUL-0: CVE-2022-1462: kernel-source,kernel-source-rt,kernel-source-azure: A race condition vulnerability in drivers/tty/tty_buffers.c</issue> <issue id="1200442" tracker="bnc">kernel-install-tools should be recommended by all kernel-source flavors</issue> <issue id="1200598" tracker="bnc">VUL-0: CVE-2022-20166: kernel-source-rt,kernel-source,kernel-source-azure: possible out of bounds write due to sprintf unsafety</issue> <issue id="1200910" tracker="bnc">VUL-0: CVE-2020-36558: kernel: use after free due to race condition between ioctl(VT_DISALLOCATE) and ioctl(VT_RESIZEX)</issue> <issue id="1201050" tracker="bnc">VUL-0: CVE-2021-26341: kernel: straight line speculation on x86</issue> <issue id="1201429" tracker="bnc">VUL-0: CVE-2020-36557: kernel use after free due to race condition in ioctl(VT_DISALLOCATE)</issue> <issue id="1201635" tracker="bnc">VUL-0: CVE-2021-33655: kernel-source,kernel-source-azure,kernel-source-rt: Out of bounds write with ioctl cmd FBIOPUT_VSCREENINFO</issue> <issue id="1201636" tracker="bnc">VUL-0: CVE-2021-33656: kernel-source-azure,kernel-source,kernel-source-rt: When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds</issue> <issue id="1201926" tracker="bnc">L3: Important CIFS fixes missing from several SLES versions (kernel)</issue> <issue id="1201930" tracker="bnc">Regression running some VM guests with 5.3.18-150300.59.87.1</issue> <issue id="1201940" tracker="bnc">VUL-0: CVE-2022-36946: kernel-source-azure,kernel-source,kernel-source-rt: incorrect packet truncation in nfqnl_mangle() leads to remote DoS</issue> <issue id="2020-36557" tracker="cve" /> <issue id="2020-36558" tracker="cve" /> <issue id="2021-26341" tracker="cve" /> <issue id="2021-33656" tracker="cve" /> <issue id="2021-33655" tracker="cve" /> <issue id="2022-1462" tracker="cve" /> <issue id="2022-20166" tracker="cve" /> <issue id="2022-36946" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>tabraham1</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-36557: Fixed race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys that could lead to a use-after-free (bnc#1201429). - CVE-2020-36558: Fixed race condition involving VT_RESIZEX that could lead to a NULL pointer dereference and general protection fault (bnc#1200910). - CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050). - CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635). - CVE-2021-33656: Fixed out of bounds write with ioctl PIO_FONT (bnc#1201636). - CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829). - CVE-2022-20166: Fixed possible out of bounds write due to sprintf unsafety that could cause local escalation of privilege (bnc#1200598). - CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940). The following non-security bugs were fixed: - Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442) - cifs: On cifs_reconnect, resolve the hostname again (bsc#1201926). - cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1201926). - cifs: To match file servers, make sure the server hostname matches (bsc#1201926). - cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1201926). - cifs: fix potential use-after-free in cifs_echo_request() (bsc#1201926). - cifs: set a minimum of 120s for next dns resolution (bsc#1201926). - cifs: use the expiry output of dns_query to schedule next resolution (bsc#1201926). - kernel-binary.spec: Support radio selection for debuginfo. To disable debuginfo on 5.18 kernel a radio selection needs to be switched to a different selection. This requires disabling the currently active option and selecting NONE as debuginfo type. - kernel-binary.spec: check s390x vmlinux location As a side effect of mainline commit edd4a8667355 ("s390/boot: get rid of startup archive"), vmlinux on s390x moved from "compressed" subdirectory directly into arch/s390/boot. As the specfile is shared among branches, check both locations and let objcopy use one that exists. - kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930). - kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930). - pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config - rpm/*.spec.in: remove backtick usage - rpm/constraints.in: skip SLOW_DISK workers for kernel-source - rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775) - rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775) - rpm/kernel-obs-build.spec.in: use default dracut modules (bsc#1195926, bsc#1198484). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor