[LU-15773] kernel update [SLES12 SP5 4.12.14-122.116.1] Created: 21/Apr/22  Updated: 18/Jun/22  Resolved: 11/Jun/22

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: Lustre 2.16.0

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Fixed Votes: 0
Labels: None

Issue Links:
Related
is related to LU-15679 kernel update [SLES12 SP5 4.12.14-122... Resolved
is related to LU-15960 kernel update [SLES12 SP5 4.12.14-122... Resolved
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 12 SP5 kernel was updated.

The following security bugs were fixed:

  • CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the
    netfilter subsystem. This vulnerability gives an attacker a powerful
    primitive that can be used to both read from and write to relative stack
    data, which can lead to arbitrary code execution. (bsc#1197227)
  • CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c
    vulnerability in the Linux kernel. (bnc#1198033)
  • CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c
    vulnerability in the Linux kernel. (bnc#1198031)
  • CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c
    vulnerability in the Linux kernel. (bnc#1198032)
  • CVE-2022-0812: Fixed an incorrect header size calculations which could
    lead to a memory leak. (bsc#1196639)
  • CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to
    use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock.
    (bsc#1197331)
  • CVE-2022-0850: Fixed a kernel information leak vulnerability in
    iov_iter.c. (bsc#1196761)
  • CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which
    allowed attackers to obtain sensitive information from the memory via
    crafted frame lengths from a USB device. (bsc#1196836)
  • CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c
    which could lead to an use-after-free if there is a corrupted quota
    file. (bnc#1197366)
  • CVE-2021-39713: Fixed a race condition in the network scheduling
    subsystem which could lead to a use-after-free. (bnc#1196973)
    -
    CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,
    CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have
    lead to read/write access to memory pages or denial of service. These
    issues are related to the Xen PV device frontend drivers. (bsc#1196488)
  • CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An
    attacker with adjacent NFC access could crash the system or corrupt the
    system memory. (bsc#1196830)
  • CVE-2022-0001,CVE-2022-0002,CVE-2022-23960: Fixed a new kind of
    speculation issues, exploitable via JITed eBPF for instance.
    (bsc#1191580)
  • CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP
    transformation code. This flaw allowed a local attacker with a normal
    user privilege to overwrite kernel heap objects and may cause a local
    privilege escalation. (bnc#1197462)

The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html



 Comments   
Comment by Gerrit Updater [ 21/Apr/22 ]

"Jian Yu <yujian@whamcloud.com>" uploaded a new patch: https://review.whamcloud.com/47115
Subject: LU-15773 kernel: kernel update SLES12 SP5 [4.12.14-122.116.1]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 7723ccbf7c370e8d0998a10a5c9253a611a5ea33

Comment by Gerrit Updater [ 13/May/22 ]

"Jian Yu <yujian@whamcloud.com>" uploaded a new patch: https://review.whamcloud.com/47331
Subject: LU-15773 kernel: kernel update SLES12 SP5 [4.12.14-122.116.1]
Project: fs/lustre-release
Branch: b2_15
Current Patch Set: 1
Commit: 1733f31a96fc527263a097ffc6924361b4204023

Comment by Gerrit Updater [ 11/Jun/22 ]

"Oleg Drokin <green@whamcloud.com>" merged in patch https://review.whamcloud.com/47115/
Subject: LU-15773 kernel: kernel update SLES12 SP5 [4.12.14-122.116.1]
Project: fs/lustre-release
Branch: master
Current Patch Set:
Commit: 08f7b5c57525d4a5115fb06b6ab54dee50a37790

Comment by Peter Jones [ 11/Jun/22 ]

Landed for 2.16

Generated at Sat Feb 10 03:21:10 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.