[LU-15677] kernel update [SLES15 SP2 5.3.18-24.107.1] Created: 23/Mar/22  Updated: 17/Jun/22  Resolved: 17/Jun/22

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Won't Fix Votes: 0
Labels: None

Issue Links:
Related
is related to LU-15568 kernel update [SLES15 SP2 5.3.18-24.1... Resolved
is related to LU-15771 kernel update [SLES15 SP2 5.3.18-1502... Resolved
Rank (Obsolete): 9223372036854775807

 Description   

The following security bugs were fixed:

  • CVE-2022-0001: Fixed Branch History Injection vulnerability
    (bsc#1191580).
  • CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability
    (bsc#1191580).
  • CVE-2022-0847: Fixed a vulnerability were a local attackers could
    overwrite data in arbitrary (read-only) files (bsc#1196584).
  • CVE-2022-0617: Fixed a null pointer dereference in UDF file system
    functionality. A local user could crash the system by triggering
    udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
  • CVE-2022-0644: Fixed a denial of service by a local user. A assertion
    failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
  • CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were
    not considered, which lead to a move_data_page NULL pointer dereference
    (bsc#1195987).
  • CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in
    drivers/net/hamradio/yam.c (bsc#1195897).
  • CVE-2022-0487: A use-after-free vulnerability was found in
    rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c
    (bsc#1194516).
  • CVE-2022-0492: Fixed a privilege escalation related to cgroups v1
    release_agent feature, which allowed bypassing namespace isolation
    unexpectedly (bsc#1195543).
  • CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets
    the O_DIRECTORY flag, and tries to open a regular file,
    nfs_atomic_open() performs a regular lookup. If a regular file is found,
    ENOTDIR should have occured, but the server instead returned
    uninitialized data in the file descriptor (bsc#1195612).
  • CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the
    RNDIS_MSG_SET command. Attackers can obtain sensitive information from
    kernel memory (bsc#1196235).
  • CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390
    allows kernel memory read/write (bsc#1195516).
  • CVE-2022-25258: The USB Gadget subsystem lacked certain validation of
    interface OS descriptor requests, which could have lead to memory
    corruption (bsc#1196096).
  • CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf
    release (bsc#1195905).

The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html



 Comments   
Comment by Gerrit Updater [ 23/Mar/22 ]

"Jian Yu <yujian@whamcloud.com>" uploaded a new patch: https://review.whamcloud.com/46897
Subject: LU-15677 kernel: kernel update SLES15 SP2 [5.3.18-24.107.1]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 2d415fa43fb50475cbff7bbf3f05de85013baa3f

Generated at Sat Feb 10 03:20:22 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.