[LU-16092] kernel update [SLES15 SP3 5.3.18-150300.59.87.1] Created: 11/Aug/22  Updated: 29/Aug/22  Resolved: 29/Aug/22

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Won't Fix Votes: 0
Labels: None

Issue Links:
Related
is related to LU-15958 kernel update [SLES15 SP3 5.3.18-1503... Resolved
is related to LU-16122 kernel update [SLES15 SP3 5.3.18-1503... Resolved
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre
    like Branch Target Buffer attack, that can leak arbitrary kernel
    information (bsc#1199657).
  • CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that
    could be used by a local attacker to escalate privileges (bnc#1201171).
  • CVE-2021-26341: Some AMD CPUs may transiently execute beyond
    unconditional direct branches, which may potentially result in data
    leakage (bsc#1201050).
  • CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in
    the way a user forces the ath9k_htc_wait_for_target function to fail
    with some input messages (bsc#1199487).
  • CVE-2022-20132: Fixed out of bounds read due to improper input
    validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
  • CVE-2022-1012: Fixed information leak caused by small table perturb size
    in the TCP source port generation algorithm (bsc#1199482).
  • CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
  • CVE-2022-20141: Fixed a possible use after free due to improper locking
    in ip_check_mc_rcu() (bsc#1200604).
  • CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS
    subsystem, related to the replication of files with NFS. A user could
    potentially crash the system or escalate privileges on the system
    (bsc#1194013).
  • CVE-2022-20154: Fixed a use after free due to a race condition in
    lock_sock_nested of sock.c. This could lead to local escalation of
    privilege with System execution privileges needed (bsc#1200599).

The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html



 Comments   
Comment by Gerrit Updater [ 12/Aug/22 ]

"Jian Yu <yujian@whamcloud.com>" uploaded a new patch: https://review.whamcloud.com/48203
Subject: LU-16092 kernel: kernel update SLES15 SP3 [5.3.18-150300.59.87.1]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 957fa30e5798da51dd57171f7f94eb5a264f8204

Comment by Jian Yu [ 29/Aug/22 ]

A new version is available in LU-16122.

Generated at Sat Feb 10 03:23:56 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.