[LU-15958] kernel update [SLES15 SP3 5.3.18-150300.59.71.2] Created: 18/Jun/22  Updated: 11/Aug/22  Resolved: 11/Aug/22

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Won't Fix Votes: 0
Labels: None

Issue Links:
Related
is related to LU-15772 kernel update [SLES15 SP3 5.3.18-1503... Resolved
is related to LU-16092 kernel update [SLES15 SP3 5.3.18-1503... Resolved
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

  • CVE-2022-0168: Fixed a NULL pointer dereference in
    smb2_ioctl_query_info. (bsc#1197472)
  • CVE-2022-20008: Fixed bug that allows to read kernel heap memory due to
    uninitialized data in mmc_blk_read_single of block.c. (bnc#1199564)
  • CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to
    privilege escalation. (bsc#1200019)
  • CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited
    to speculatively/transiently disclose information via spectre like
    attacks. (bsc#1199650)
  • CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited
    to speculatively/transiently disclose information via spectre like
    attacks. (bsc#1199650)
  • CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited
    to speculatively/transiently disclose information via spectre like
    attacks. (bsc#1199650)
  • CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited
    to speculatively/transiently disclose information via spectre like
    attacks. (bsc#1199650)
  • CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited
    to speculatively/transiently disclose information via spectre like
    attacks. (bsc#1199650)
  • CVE-2019-19377: Fixed an user-after-free that could be triggered when an
    attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
  • CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self
    (bsc#1199507).
  • CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when
    mounting and operating on a corrupted image. (bsc#1198577)
  • CVE-2022-1652: Fixed a statically allocated error counter inside the
    floppy kernel module (bsc#1199063).
  • CVE-2022-30594: Fixed restriction bypass on setting the
    PT_SUSPEND_SECCOMP flag (bnc#1199505).
  • CVE-2021-33061: Fixed insufficient control flow management for the
    Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed
    an authenticated user to potentially enable denial of service via local
    access (bnc#1196426).

The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html



 Comments   
Comment by Gerrit Updater [ 22/Jun/22 ]

"Jian Yu <yujian@whamcloud.com>" uploaded a new patch: https://review.whamcloud.com/47694
Subject: LU-15958 kernel: kernel update SLES15 SP3 [5.3.18-150300.59.71.2]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: c8143661ecfe22882c99c513dff26877c29a115b

Comment by Jian Yu [ 11/Aug/22 ]

A new version is in LU-15958.

Generated at Sat Feb 10 03:22:45 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.