openSUSE Security Announce
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
September 2021
- 1 participants
- 75 discussions
openSUSE-SU-2021:1301-1: moderate: Security update for xen
by opensuse-security@opensuse.org 22 Sep '21
by opensuse-security@opensuse.org 22 Sep '21
22 Sep '21
openSUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1301-1
Rating: moderate
References: #1027519 #1189632
Cross-References: CVE-2021-28701
CVSS scores:
CVE-2021-28701 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for xen fixes the following issues:
- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling
(XSA-384) (bsc#1189632).
- Upstream bug fixes (bsc#1027519)
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1301=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
xen-debugsource-4.13.3_04-lp152.2.30.1
xen-devel-4.13.3_04-lp152.2.30.1
xen-libs-4.13.3_04-lp152.2.30.1
xen-libs-debuginfo-4.13.3_04-lp152.2.30.1
xen-tools-domU-4.13.3_04-lp152.2.30.1
xen-tools-domU-debuginfo-4.13.3_04-lp152.2.30.1
- openSUSE Leap 15.2 (noarch):
xen-tools-xendomains-wait-disk-4.13.3_04-lp152.2.30.1
- openSUSE Leap 15.2 (x86_64):
xen-4.13.3_04-lp152.2.30.1
xen-doc-html-4.13.3_04-lp152.2.30.1
xen-libs-32bit-4.13.3_04-lp152.2.30.1
xen-libs-32bit-debuginfo-4.13.3_04-lp152.2.30.1
xen-tools-4.13.3_04-lp152.2.30.1
xen-tools-debuginfo-4.13.3_04-lp152.2.30.1
References:
https://www.suse.com/security/cve/CVE-2021-28701.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1189632
1
0
openSUSE-SU-2021:1294-1: moderate: Security update for libcroco
by opensuse-security@opensuse.org 21 Sep '21
by opensuse-security@opensuse.org 21 Sep '21
21 Sep '21
openSUSE Security Update: Security update for libcroco
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1294-1
Rating: moderate
References: #1171685
Cross-References: CVE-2020-12825
CVSS scores:
CVE-2020-12825 (NVD) : 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2020-12825 (SUSE): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libcroco fixes the following issues:
- CVE-2020-12825: Fixed recursion issue in block and any productions
(bsc#1171685).
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1294=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
libcroco-0.6.13-lp152.2.3.1
libcroco-0_6-3-0.6.13-lp152.2.3.1
libcroco-0_6-3-debuginfo-0.6.13-lp152.2.3.1
libcroco-debuginfo-0.6.13-lp152.2.3.1
libcroco-debugsource-0.6.13-lp152.2.3.1
libcroco-devel-0.6.13-lp152.2.3.1
- openSUSE Leap 15.2 (x86_64):
libcroco-0_6-3-32bit-0.6.13-lp152.2.3.1
libcroco-0_6-3-32bit-debuginfo-0.6.13-lp152.2.3.1
References:
https://www.suse.com/security/cve/CVE-2020-12825.html
https://bugzilla.suse.com/1171685
1
0
openSUSE-SU-2021:3179-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 21 Sep '21
by opensuse-security@opensuse.org 21 Sep '21
21 Sep '21
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3179-1
Rating: important
References: #1040364 #1127650 #1135481 #1152489 #1160010
#1168202 #1171420 #1174969 #1175052 #1175543
#1177399 #1180100 #1180141 #1180347 #1181006
#1181148 #1181972 #1184180 #1185902 #1186264
#1186731 #1187211 #1187455 #1187468 #1187483
#1187619 #1187959 #1188067 #1188172 #1188231
#1188270 #1188412 #1188418 #1188616 #1188700
#1188780 #1188781 #1188782 #1188783 #1188784
#1188786 #1188787 #1188788 #1188790 #1188878
#1188885 #1188924 #1188982 #1188983 #1188985
#1189021 #1189057 #1189077 #1189153 #1189197
#1189209 #1189210 #1189212 #1189213 #1189214
#1189215 #1189216 #1189217 #1189218 #1189219
#1189220 #1189221 #1189222 #1189225 #1189229
#1189233 #1189262 #1189291 #1189292 #1189296
#1189298 #1189301 #1189305 #1189323 #1189384
#1189385 #1189392 #1189393 #1189399 #1189400
#1189427 #1189503 #1189504 #1189505 #1189506
#1189507 #1189562 #1189563 #1189564 #1189565
#1189566 #1189567 #1189568 #1189569 #1189573
#1189574 #1189575 #1189576 #1189577 #1189579
#1189581 #1189582 #1189583 #1189585 #1189586
#1189587 #1189696 #1189706 #1189760 #1189762
#1189832 #1189841 #1189870 #1189872 #1189883
#1190022 #1190025 #1190115 #1190117 #1190412
#1190413 #1190428
Cross-References: CVE-2020-12770 CVE-2021-34556 CVE-2021-35477
CVE-2021-3640 CVE-2021-3653 CVE-2021-3656
CVE-2021-3679 CVE-2021-3732 CVE-2021-3739
CVE-2021-3743 CVE-2021-3753 CVE-2021-3759
CVE-2021-38160 CVE-2021-38166 CVE-2021-38198
CVE-2021-38204 CVE-2021-38205 CVE-2021-38206
CVE-2021-38207 CVE-2021-38209
CVSS scores:
CVE-2020-12770 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2020-12770 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2021-34556 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-35477 (SUSE): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVE-2021-3640 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-3653 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-3656 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-3679 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-3732 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVE-2021-3739 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2021-3743 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-3753 (SUSE): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2021-3759 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-38160 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-38166 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-38198 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-38204 (SUSE): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-38205 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVE-2021-38206 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-38206 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-38207 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-38209 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves 20 vulnerabilities and has 107 fixes
is now available.
Description:
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function
sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows
a malicious L1 guest to enable AVIC support for the L2 guest.
(bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and
allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and
VLS for the L2 guest (bsc#1189400).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality
was found in the way user uses trace ring buffer in a specific way. Only
privileged local users (with CAP_SYS_ADMIN capability) could use this
flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace
can reveal files (bsc#1189706).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by
invalid id (bsc#1189832 ).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling
(bsc#1190025).
- CVE-2021-38160: Data corruption or loss could be triggered by an
untrusted device that supplies a buf->len value exceeding the buffer
size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the
access permissions of a shadow page, leading to a missing guest
protection page fault (bnc#1189262).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically
proximate attackers to cause a denial of service (use-after-free and
panic) by removing a MAX-3421 USB device in certain situations
(bnc#1189291).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it
easier for attackers to defeat an ASLR protection mechanism because it
prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed
remote attackers to cause a denial of service (buffer overflow and
lockup) by sending heavy network traffic for about ten minutes
(bnc#1189298).
- CVE-2021-38166: Fixed an integer overflow and out-of-bounds write when
many elements are placed in a single bucket in kernel/bpf/hashtab.c
(bnc#1189233 ).
- CVE-2021-38209: Fixed allowed observation of changes in any net
namespace via net/netfilter/nf_conntrack_standalone.c (bnc#1189393).
- CVE-2021-38206: Fixed NULL pointer dereference in the radiotap parser
inside the mac80211 subsystem (bnc#1189296).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass
via unprivileged BPF program that could have obtain sensitive
information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been
abused to disclose content of arbitrary kernel memory (bsc#1188985).
- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead
to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases
(bsc#1171420).
The following non-security bugs were fixed:
- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR
(bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications
(git-fixes).
- ALSA: hda/hdmi: Add quirk to force pin connectivity on NUC10 (git-fixes).
- ALSA: hda/hdmi: fix max DP-MST dev_num for Intel TGL+ platforms
(git-fixes).
- ALSA: hda/hdmi: let new platforms assign the pcm slot dynamically
(git-fixes).
- ALSA: hda/realtek - Add ALC285 HP init procedure (git-fixes).
- ALSA: hda/realtek - Add type for ALC287 (git-fixes).
- ALSA: hda/realtek: Change device names for quirks to barebone names
(git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop
(git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256)
(git-fixes).
- ALSA: hda/realtek: Limit mic boost on HP ProBook 445 G8 (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/realtek: fix mute led of the HP Pavilion 15-eh1xxx series
(git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 650 G8 Notebook
PC (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: hda: Fix hang during shutdown due to link reset (git-fixes).
- ALSA: hda: Release controller display power during shutdown/reboot
(git-fixes).
- ALSA: pcm: Fix mmap breakage without explicit buffer setup (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Avoid unnecessary or invalid connector selection at
resume (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Fix module resource and format selection
(git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs
(git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix format selection for max98373
(git-fixes).
- ASoC: SOF: Intel: hda-ipc: fix reply size checking (git-fixes).
- ASoC: amd: Fix reference to PCM buffer address (git-fixes).
- ASoC: component: Remove misplaced prefix handling in pin control
functions (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency
(git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: mediatek: mt8183: Fix Unbalanced pm_runtime_enable in
mt8183_afe_pcm_dev_probe (git-fixes).
- ASoC: rt5682: Adjust headset volume button threshold (git-fixes).
- ASoC: rt5682: Adjust headset volume button threshold again (git-fixes).
- ASoC: rt5682: Fix the issue of garbled recording after
powerd_dbus_suspend (git-fixes).
- ASoC: ti: j721e-evm: Check for not initialized parent_clk_id (git-fixes).
- ASoC: ti: j721e-evm: Fix unbalanced domain activity tracking during
startup (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: uniphier: Fix reference to PCM buffer address (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function
(git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe
function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Avoid double printing SUSE specific flags in mod->taint (bsc#1190413).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: btusb: Fix a unspported condition to set available debug
features (git-fixes).
- Bluetooth: btusb: check conditions before enabling USB ALT 3 for WBS
(git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev()
(git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait
(git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer
overflow (git-fixes).
- Bluetooth: mgmt: Fix wrong opcode in the response for add_adv cmd
(git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept()
(git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path
(bsc#1188788).
- KVM: VMX: Extend VMXs #AC interceptor to handle split lock #AC in guest
(bsc#1187959).
- KVM: nVMX: Handle split-lock #AC exceptions that happen in L2
(bsc#1187959).
- KVM: nVMX: Really make emulated nested preemption timer pinned
(bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs
(bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02
(bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration
(bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit
(bsc#1188784).
- KVM: x86: Emulate split-lock access as a write in emulator (bsc#1187959).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264
bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times
(git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client()
(bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently
(git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- RDMA/bnxt_re: Fix stats counters (bsc#1188231).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202
bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue
(bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202
bsc#1188924).
- SUNRPC: improve error response to over-size gss credential (bsc#1190022).
- SUNRPC: prevent port reuse on transports which do not request it
(bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates
(git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in
iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by
rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- bnxt_en: Validate vlan protocol ID on RX packets (jsc#SLE-15075).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189079).
- btrfs: add a trace class for dumping the current ENOSPC state
(bsc#1135481).
- btrfs: add a trace point for reserve tickets (bsc#1135481).
- btrfs: adjust the flush trace point to include the source (bsc#1135481).
- btrfs: check reclaim_size in need_preemptive_reclaim (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix btrfs_calc_reclaim_metadata_size calculation (bsc#1135481).
- btrfs: fix deadlock with concurrent chunk allocations involving system
chunks (bsc#1189077).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: implement space clamping for preemptive flushing (bsc#1135481).
- btrfs: improve preemptive background space flushing (bsc#1135481).
- btrfs: introduce a FORCE_COMMIT_TRANS flush operation (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make flush_space take a enum btrfs_flush_state instead of int
(bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove FLUSH_DELAYED_REFS from data ENOSPC flushing (bsc#1135481).
- btrfs: rename need_do_async_reclaim (bsc#1135481).
- btrfs: rework btrfs_calc_reclaim_metadata_size (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk
array (bsc#1189077).
- btrfs: rip out btrfs_space_info::total_bytes_pinned (bsc#1135481).
- btrfs: rip the first_ticket_bytes logic from fail_all_tickets
(bsc#1135481).
- btrfs: simplify the logic in need_preemptive_flushing (bsc#1135481).
- btrfs: tracepoints: convert flush states to using EM macros
(bsc#1135481).
- btrfs: tracepoints: fix btrfs_trigger_flush symbolic string for flags
(bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN
RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change
(bsc#1189427).
- cifs: Remove unused inline function is_sysvol_or_netlogon()
(bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks
(bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit
(git-fixes).
- device-dax: Fix default return code of range_parse() (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling
(git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load
fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: idxd: fix setup sequence for MSIXPERM table (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work
(git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work
(git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is
not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe()
(git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating
transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amd/display: Fix Dynamic bpp issue with 8K30 with Navi 1X
(git-fixes).
- drm/amd/display: Fix comparison error in dcn21 DML (git-fixes).
- drm/amd/display: Fix max vstartup calculation for modes with borders
(git-fixes).
- drm/amd/display: Remove invalid assert for ODM + MPC case (git-fixes).
- drm/amd/display: use GFP_ATOMIC in amdgpu_dm_irq_schedule_work
(git-fixes).
- drm/amd/display: workaround for hard hang on HPD on native DP
(git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/amdgpu/display: fix DMUB firmware version info (git-fixes).
- drm/amdgpu/display: only enable aux backlight control for OLED panels
(git-fixes).
- drm/amdgpu: do not enable baco on boco platforms in runpm (git-fixes).
- drm/amdgpu: fix the doorbell missing when in CGPG issue for renoir
(git-fixes).
- drm/dp_mst: Fix return code on sideband message failure (git-fixes).
- drm/i915/dg1: gmbus pin mapping (bsc#1188700).
- drm/i915/dg1: provide port/phy mapping for vbt (bsc#1188700).
- drm/i915/gen9_bc: Add W/A for missing STRAP config on TGP PCH + CML
combos (bsc#1188700).
- drm/i915/gen9_bc: Introduce HPD pin mappings for TGP PCH + CML combos
(bsc#1188700).
- drm/i915/gen9_bc: Introduce TGP PCH DDC pin mappings (bsc#1188700).
- drm/i915/gen9_bc: Recognize TGP PCH + CML combos (bsc#1188700).
- drm/i915/rkl: new rkl ddc map for different PCH (bsc#1188700).
- drm/i915: Add VBT AUX CH H and I (bsc#1188700).
- drm/i915: Add VBT DVO ports H and I (bsc#1188700).
- drm/i915: Add more AUX CHs to the enum (bsc#1188700).
- drm/i915: Configure GEN11_{TBT,TC}_HOTPLUG_CTL for ports TC5/6
(bsc#1188700).
- drm/i915: Correct SFC_DONE register offset (git-fixes).
- drm/i915: Introduce HPD_PORT_TC<n> (bsc#1188700).
- drm/i915: Move hpd_pin setup to encoder init (bsc#1188700).
- drm/i915: Nuke the redundant TC/TBT HPD bit defines (bsc#1188700).
- drm/i915: Only access SFC_DONE when media domain is not fused off
(git-fixes).
- drm/meson: fix colour distortion from HDR set during vendor u-boot
(git-fixes).
- drm/msi/mdp4: populate priv->kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs
(git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/msm: Fix error return code in msm_drm_init() (git-fixes).
- drm/nouveau/kms/nv50: workaround EFI GOP window channel format
differences (git-fixes).
- drm/of: free the iterator object on failure (git-fixes).
- drm/of: free the right object (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in
panfrost_clk_init() (git-fixes).
- drm/prime: fix comment on PRIME Helpers (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a
transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit
(bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories
(bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs
(git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in
fw_load_sysfs_fallback (git-fixes).
- fixup "rpm: support gz and zst compression methods" (bsc#1190358,
bsc#1190428).
- fpga: altera-freeze-bridge: Address warning about unused variable
(git-fixes).
- fpga: dfl: fme: Fix cpu hotplug issue in performance reporting
(git-fixes).
- fpga: dfl: fme: Fix cpu hotplug issue in performance reporting
(git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels
(git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used
(bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors
(bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399,
bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables
(bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform
(bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables
(bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/amd: Move Stoney Ridge check to detect_ivrs() (bsc#1189762).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq
(bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device()
(bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread()
(bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed
(bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed
(bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- ionic: add handling of larger descriptors (jsc#SLE-16649).
- ionic: add new queue features to interface (jsc#SLE-16649).
- ionic: aggregate Tx byte counting calls (jsc#SLE-16649).
- ionic: block actions during fw reset (jsc#SLE-16649).
- ionic: change mtu after queues are stopped (jsc#SLE-16649).
- ionic: check for link after netdev registration (jsc#SLE-16649).
- ionic: code cleanup details (jsc#SLE-16649).
- ionic: fix sizeof usage (jsc#SLE-16649).
- ionic: fix unchecked reference (jsc#SLE-16649).
- ionic: fix up dim accounting for tx and rx (jsc#SLE-16649).
- ionic: generic tx skb mapping (jsc#SLE-16649).
- ionic: implement Rx page reuse (jsc#SLE-16649).
- ionic: make all rx_mode work threadsafe (jsc#SLE-16649).
- ionic: move rx_page_alloc and free (jsc#SLE-16649).
- ionic: optimize fastpath struct usage (jsc#SLE-16649).
- ionic: protect adminq from early destroy (jsc#SLE-16649).
- ionic: rebuild debugfs on qcq swap (jsc#SLE-16649).
- ionic: remove intr coalesce update from napi (jsc#SLE-16649).
- ionic: remove some unnecessary oom messages (jsc#SLE-16649).
- ionic: simplify TSO descriptor mapping (jsc#SLE-16649).
- ionic: simplify rx skb alloc (jsc#SLE-16649).
- ionic: simplify the intr_index use in txq_init (jsc#SLE-16649).
- ionic: simplify tx clean (jsc#SLE-16649).
- ionic: simplify use of completion types (jsc#SLE-16649).
- ionic: start queues before announcing link up (jsc#SLE-16649).
- ionic: stop watchdog when in broken state (jsc#SLE-16649).
- ionic: useful names for booleans (jsc#SLE-16649).
- iwlwifi: pnvm: accept multiple HW-type TLVs (git-fixes).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- iwlwifi: skip first element in the WTAS ACPI table (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when
reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a
workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and
arch_set_restart_data() (bsc#1189153).
- kernel-cert-subpackage: Fix certificate location in scriptlets
(bsc#1189841).
- leds: trigger: audio: Add an activate callback to ensure the initial
brightness is set (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- lib: Add zstd support to decompress (bsc#1187483, jsc#SLE-18766).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request
(git-fixes).
- md: revert io stats accounting (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect
(git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer
fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe()
(git-fixes).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp()
(git-fixes).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page()
(bsc#1189569).
- mm/vmscan: fix infinite loop in drop_slab_node (VM Functionality,
bsc#1189301).
- mm: fix memory_failure() handling of dax-namespace metadata
(bsc#1189872).
- mm: swap: properly update readahead statistics in unuse_pte_range()
(bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711
(git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards
(git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- net/mlx5: Add ts_cqe_to_dest_cqn related bits (bsc#1188412)
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net/mlx5e: Add missing capability check for uplink follow (bsc#1188412)
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext
(git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- net: usb: lan78xx: do not modify phy_device state concurrently
(bsc#1188270)
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth
(bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data
(bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation
(bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path
(bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- perf/x86/amd: Do not touch the AMD64_EVENTSEL_HOSTONLY bit inside the
guest (bsc#1189225).
- pinctrl: tigerlake: Fix GPIO mapping for newer version of software
(git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to
gpio-lookup tables (git-fixes).
- post.sh: detect /usr mountpoint too
- power: supply: max17042: handle fails of reading status register
(git-fixes).
- powerpc/cacheinfo: Improve diagnostics about malformed cache lists
(jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Lookup cache by dt node and thread-group id
(jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Remove the redundant get_shared_cpu_map()
(jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Use name@unit instead of full DT path in debug
messages (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable
(bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible
(bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules
(bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM
(bsc#1188885 ltc#193722 git-fixes).
- powerpc/smp: Make some symbols static (jsc#SLE-13615 bsc#1180100
ltc#190257 git-fixes).
- powerpc/smp: Use existing L2 cache_map cpumask to find L3 cache siblings
(jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148
ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops
(git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path
(git-fixes).
- rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible
to use kmod with ZSTD support on non-Tumbleweed.
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm/kernel-source.rpmlintrc: ignore new include/config files In 5.13,
since 0e0345b77ac4, config files have no longer .h suffix. Adapt the
zero-length check. Based on Martin Liska's change.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982
LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385
jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385
jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters
(bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC
completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset
(bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC
completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling
(bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine
(bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling
(bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines
(bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR
request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted()
(bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE
(bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS
handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba->poll_list earlier to avoid
crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF
(bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr
(bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters
(bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path
(bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support
(bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail()
(bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread
(bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc
(bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385
jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385
jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385
jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385
jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385
jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385
jsc#SLE-18970).
- scsi: mpt3sas: Fix ReplyPostFree pool allocation (bsc#1181006).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword()
(bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes "allloc" -> "alloc" (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port()
(bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop
(bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt
(bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of
list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI
(bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire
(bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els
(bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts
(bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state
(bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable
pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off
(git-fixes).
- serial: 8250_pci: Avoid irq sharing for MSI(-X) interrupts (git-fixes).
- serial: 8250_pci: Enumerate Elkhart Lake UARTs via dedicated driver
(git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs
(git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero
(git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked
(git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation
(git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config
(git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config
(git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in
TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL
event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked
(bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode
(bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode()
(bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable
DMA config is available (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller
(git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended
(git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable
(git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers
(git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init
(git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function
(git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe
(git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion
(git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- usr: Add support for zstd compressed initramfs (bsc#1187483,
jsc#SLE-18766).
- virt_wifi: fix error on connect (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing
single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/sev: Make sure IRQs are disabled while GHCB is active
(jsc#SLE-14337).
- x86/sev: Split up runtime #VC handler for correct state tracking
(jsc#SLE-14337).
- x86/sev: Use "SEV: " prefix for messages from sev.c (jsc#SLE-14337).
- x86/signal: Detect and prevent an alternate signal stack overflow
(bsc#1152489).
- x86/split_lock: Provide handle_guest_split_lock() (bsc#1187959).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3179=1
Package List:
- openSUSE Leap 15.3 (noarch):
kernel-devel-azure-5.3.18-38.22.1
kernel-source-azure-5.3.18-38.22.1
- openSUSE Leap 15.3 (x86_64):
cluster-md-kmp-azure-5.3.18-38.22.2
cluster-md-kmp-azure-debuginfo-5.3.18-38.22.2
dlm-kmp-azure-5.3.18-38.22.2
dlm-kmp-azure-debuginfo-5.3.18-38.22.2
gfs2-kmp-azure-5.3.18-38.22.2
gfs2-kmp-azure-debuginfo-5.3.18-38.22.2
kernel-azure-5.3.18-38.22.2
kernel-azure-debuginfo-5.3.18-38.22.2
kernel-azure-debugsource-5.3.18-38.22.2
kernel-azure-devel-5.3.18-38.22.2
kernel-azure-devel-debuginfo-5.3.18-38.22.2
kernel-azure-extra-5.3.18-38.22.2
kernel-azure-extra-debuginfo-5.3.18-38.22.2
kernel-azure-livepatch-devel-5.3.18-38.22.2
kernel-azure-optional-5.3.18-38.22.2
kernel-azure-optional-debuginfo-5.3.18-38.22.2
kernel-syms-azure-5.3.18-38.22.1
kselftests-kmp-azure-5.3.18-38.22.2
kselftests-kmp-azure-debuginfo-5.3.18-38.22.2
ocfs2-kmp-azure-5.3.18-38.22.2
ocfs2-kmp-azure-debuginfo-5.3.18-38.22.2
reiserfs-kmp-azure-5.3.18-38.22.2
reiserfs-kmp-azure-debuginfo-5.3.18-38.22.2
References:
https://www.suse.com/security/cve/CVE-2020-12770.html
https://www.suse.com/security/cve/CVE-2021-34556.html
https://www.suse.com/security/cve/CVE-2021-35477.html
https://www.suse.com/security/cve/CVE-2021-3640.html
https://www.suse.com/security/cve/CVE-2021-3653.html
https://www.suse.com/security/cve/CVE-2021-3656.html
https://www.suse.com/security/cve/CVE-2021-3679.html
https://www.suse.com/security/cve/CVE-2021-3732.html
https://www.suse.com/security/cve/CVE-2021-3739.html
https://www.suse.com/security/cve/CVE-2021-3743.html
https://www.suse.com/security/cve/CVE-2021-3753.html
https://www.suse.com/security/cve/CVE-2021-3759.html
https://www.suse.com/security/cve/CVE-2021-38160.html
https://www.suse.com/security/cve/CVE-2021-38166.html
https://www.suse.com/security/cve/CVE-2021-38198.html
https://www.suse.com/security/cve/CVE-2021-38204.html
https://www.suse.com/security/cve/CVE-2021-38205.html
https://www.suse.com/security/cve/CVE-2021-38206.html
https://www.suse.com/security/cve/CVE-2021-38207.html
https://www.suse.com/security/cve/CVE-2021-38209.html
https://bugzilla.suse.com/1040364
https://bugzilla.suse.com/1127650
https://bugzilla.suse.com/1135481
https://bugzilla.suse.com/1152489
https://bugzilla.suse.com/1160010
https://bugzilla.suse.com/1168202
https://bugzilla.suse.com/1171420
https://bugzilla.suse.com/1174969
https://bugzilla.suse.com/1175052
https://bugzilla.suse.com/1175543
https://bugzilla.suse.com/1177399
https://bugzilla.suse.com/1180100
https://bugzilla.suse.com/1180141
https://bugzilla.suse.com/1180347
https://bugzilla.suse.com/1181006
https://bugzilla.suse.com/1181148
https://bugzilla.suse.com/1181972
https://bugzilla.suse.com/1184180
https://bugzilla.suse.com/1185902
https://bugzilla.suse.com/1186264
https://bugzilla.suse.com/1186731
https://bugzilla.suse.com/1187211
https://bugzilla.suse.com/1187455
https://bugzilla.suse.com/1187468
https://bugzilla.suse.com/1187483
https://bugzilla.suse.com/1187619
https://bugzilla.suse.com/1187959
https://bugzilla.suse.com/1188067
https://bugzilla.suse.com/1188172
https://bugzilla.suse.com/1188231
https://bugzilla.suse.com/1188270
https://bugzilla.suse.com/1188412
https://bugzilla.suse.com/1188418
https://bugzilla.suse.com/1188616
https://bugzilla.suse.com/1188700
https://bugzilla.suse.com/1188780
https://bugzilla.suse.com/1188781
https://bugzilla.suse.com/1188782
https://bugzilla.suse.com/1188783
https://bugzilla.suse.com/1188784
https://bugzilla.suse.com/1188786
https://bugzilla.suse.com/1188787
https://bugzilla.suse.com/1188788
https://bugzilla.suse.com/1188790
https://bugzilla.suse.com/1188878
https://bugzilla.suse.com/1188885
https://bugzilla.suse.com/1188924
https://bugzilla.suse.com/1188982
https://bugzilla.suse.com/1188983
https://bugzilla.suse.com/1188985
https://bugzilla.suse.com/1189021
https://bugzilla.suse.com/1189057
https://bugzilla.suse.com/1189077
https://bugzilla.suse.com/1189153
https://bugzilla.suse.com/1189197
https://bugzilla.suse.com/1189209
https://bugzilla.suse.com/1189210
https://bugzilla.suse.com/1189212
https://bugzilla.suse.com/1189213
https://bugzilla.suse.com/1189214
https://bugzilla.suse.com/1189215
https://bugzilla.suse.com/1189216
https://bugzilla.suse.com/1189217
https://bugzilla.suse.com/1189218
https://bugzilla.suse.com/1189219
https://bugzilla.suse.com/1189220
https://bugzilla.suse.com/1189221
https://bugzilla.suse.com/1189222
https://bugzilla.suse.com/1189225
https://bugzilla.suse.com/1189229
https://bugzilla.suse.com/1189233
https://bugzilla.suse.com/1189262
https://bugzilla.suse.com/1189291
https://bugzilla.suse.com/1189292
https://bugzilla.suse.com/1189296
https://bugzilla.suse.com/1189298
https://bugzilla.suse.com/1189301
https://bugzilla.suse.com/1189305
https://bugzilla.suse.com/1189323
https://bugzilla.suse.com/1189384
https://bugzilla.suse.com/1189385
https://bugzilla.suse.com/1189392
https://bugzilla.suse.com/1189393
https://bugzilla.suse.com/1189399
https://bugzilla.suse.com/1189400
https://bugzilla.suse.com/1189427
https://bugzilla.suse.com/1189503
https://bugzilla.suse.com/1189504
https://bugzilla.suse.com/1189505
https://bugzilla.suse.com/1189506
https://bugzilla.suse.com/1189507
https://bugzilla.suse.com/1189562
https://bugzilla.suse.com/1189563
https://bugzilla.suse.com/1189564
https://bugzilla.suse.com/1189565
https://bugzilla.suse.com/1189566
https://bugzilla.suse.com/1189567
https://bugzilla.suse.com/1189568
https://bugzilla.suse.com/1189569
https://bugzilla.suse.com/1189573
https://bugzilla.suse.com/1189574
https://bugzilla.suse.com/1189575
https://bugzilla.suse.com/1189576
https://bugzilla.suse.com/1189577
https://bugzilla.suse.com/1189579
https://bugzilla.suse.com/1189581
https://bugzilla.suse.com/1189582
https://bugzilla.suse.com/1189583
https://bugzilla.suse.com/1189585
https://bugzilla.suse.com/1189586
https://bugzilla.suse.com/1189587
https://bugzilla.suse.com/1189696
https://bugzilla.suse.com/1189706
https://bugzilla.suse.com/1189760
https://bugzilla.suse.com/1189762
https://bugzilla.suse.com/1189832
https://bugzilla.suse.com/1189841
https://bugzilla.suse.com/1189870
https://bugzilla.suse.com/1189872
https://bugzilla.suse.com/1189883
https://bugzilla.suse.com/1190022
https://bugzilla.suse.com/1190025
https://bugzilla.suse.com/1190115
https://bugzilla.suse.com/1190117
https://bugzilla.suse.com/1190412
https://bugzilla.suse.com/1190413
https://bugzilla.suse.com/1190428
1
0
openSUSE-SU-2021:3175-1: moderate: Security update for grafana-piechart-panel
by opensuse-security@opensuse.org 21 Sep '21
by opensuse-security@opensuse.org 21 Sep '21
21 Sep '21
openSUSE Security Update: Security update for grafana-piechart-panel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3175-1
Rating: moderate
References: #1172125
Cross-References: CVE-2020-13429
CVSS scores:
CVE-2020-13429 (NVD) : 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVE-2020-13429 (SUSE): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for grafana-piechart-panel fixes the following issues:
- CVE-2020-13429: Fixed XSS via the Values Header option in the
piechart-panel (bsc#1172125).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3175=1
Package List:
- openSUSE Leap 15.3 (noarch):
grafana-piechart-panel-1.6.1-3.6.1
References:
https://www.suse.com/security/cve/CVE-2020-13429.html
https://bugzilla.suse.com/1172125
1
0
openSUSE-SU-2021:1289-1: important: Security update for php-composer
by opensuse-security@opensuse.org 21 Sep '21
by opensuse-security@opensuse.org 21 Sep '21
21 Sep '21
openSUSE Security Update: Security update for php-composer
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1289-1
Rating: important
References: #1185376 #1187416
Cross-References: CVE-2021-29472
CVSS scores:
CVE-2021-29472 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.2
openSUSE Backports SLE-15-SP3
openSUSE Backports SLE-15-SP2
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for php-composer fixes the following issues:
- Require php-mbstring as requested in boo#1187416
- Version 1.10.22
* Security: Fixed command injection vulnerability in
HgDriver/HgDownloader and hardened other VCS drivers and downloaders
(GHSA-h5h8-pc6h-jvvx / CVE-2021-29472), boo#1185376
- Version 1.10.21
* Fixed support for new GitHub OAuth token format
* Fixed processes silently ignoring the CWD when it does not exist
- Version 1.10.20
* Fixed exclude-from-classmap causing regex issues when having too many
paths
* Fixed compatibility issue with Symfony 4/5
- Version 1.10.17
* Fixed Bitbucket API authentication issue
* Fixed parsing of Composer 2 lock files breaking in some rare conditions
- Version 1.10.16
* Added warning to validate command for cases where packages provide/
replace a package that they also require
* Fixed JSON schema validation issue with PHPStorm
* Fixed symlink handling in archive command
- Version 1.10.15
* Fixed path repo version guessing issue
- Version 1.10.14
* Fixed version guesser to look at remote branches as well as local
ones
* Fixed path repositories version guessing to handle edge cases where
version is different from the VCS-guessed version
* Fixed COMPOSER env var causing issues when combined with the global
command
* Fixed a few issues dealing with PHP without openssl extension (not
recommended at all but sometimes needed for testing)
- Version 1.10.13
* Fixed regressions with old version validation
* Fixed invalid root aliases not being reported
- Version 1.10.12
* Fixed regressions with old version validation
- Version 1.10.11
* Fixed more PHP 8 compatibility issues
* Fixed regression in handling of CTRL-C when xdebug is loaded
* Fixed status handling of broken symlinks
- Version 1.10.10
* Fixed create-project not triggering events while installing the root
package
* Fixed PHP 8 compatibility issue
* Fixed self-update to avoid automatically upgrading to the next major
version once it becomes stable
- Version 1.10.9
* Fixed Bitbucket redirect loop when credentials are outdated
* Fixed GitLab auth prompt wording
* Fixed self-update handling of files requiring admin permissions to
write to on Windows (it now does a UAC prompt)
* Fixed parsing issues in funding.yml files
- Version 1.10.8
* Fixed compatibility issue with git being configured to show signatures
by default
* Fixed discarding of local changes when updating packages to include
untracked files
* Several minor fixes
- Version 1.10.7
* Fixed PHP 8 deprecations
* Fixed detection of pcntl_signal being in disabled_functions when
pcntl_async_signal is allowed
- Version 1.10.6
* Fixed version guessing to take composer-runtime-api and
composer-plugin-api requirements into account to avoid selecting
packages which require Composer 2
* Fixed package name validation to allow several dashes following each
other
* Fixed post-status-cmd script not firing when there were no changes to
be displayed
* Fixed composer-runtime-api support on Composer 1.x, the package is now
present as 1.0.0
* Fixed support for composer show --name-only --self
* Fixed detection of GitLab URLs when handling authentication in some
cases
- Version 1.10.5
* Fixed self-update on PHP <5.6, seriously please upgrade
* Fixed 1.10.2 regression with PATH resolution in scripts
- Version 1.10.4
* Fixed 1.10.2 regression in path symlinking with absolute path repos
- Version 1.10.3
* Fixed invalid --2 flag warning in self-update when no channel is
requested
- Version 1.10.2
* Added --1 flag to self-update command which can be added to automated
self-update runs to make sure it won't automatically jump to 2.0 once
that is released
* Fixed path repository symlinks being made relative when the repo url
is defined as absolute paths
* Fixed potential issues when using "composer ..." in scripts and
composer/composer was also required in the project
* Fixed 1.10.0 regression when downloading GitHub archives from non-API
URLs
* Fixed handling of malformed info in fund command
* Fixed Symfony5 compatibility issues in a few commands
- Version 1.10.1
* Fixed path repository warning on empty path when using wildcards
* Fixed superfluous warnings when generating optimized autoloaders
- Version 1.10.0
* Breaking: composer global exec ... now executes the process in the
current working directory instead of executing it in the global
directory.
* Warning: Added a warning when class names are being loaded by a PSR-4
or PSR-0 rule only due to classmap optimization, but would not
otherwise be autoloadable. Composer 2.0 will stop autoloading these
classes so make sure you fix your autoload configs.
* Added new funding key to composer.json to describe ways your package's
maintenance can be funded. This reads info from GitHub's FUNDING.yml
by default so better configure it there so it shows on GitHub and
Composer/Packagist
* Added composer fund command to show funding info of your dependencies
* Added bearer auth config to authenticate using Authorization: Bearer
<token> headers
* Added plugin-api-version in composer.lock so third-party tools can
know which Composer version was used to generate a lock file
* Added support for --format=json output for show command when showing a
single package
* Added support for configuring suggestions using config command, e.g.
composer config suggest.foo/bar some text
* Added support for configuring fine-grained preferred-install using
config command, e.g. composer config preferred-install.foo/* dist
* Added @putenv script handler to set environment variables from
composer.json for following scripts
* Added lock option that can be set to false, in which case no
composer.lock file will be generated
* Added --add-repository flag to create-project command which will
persist the repo given in --repository into the composer.json of the
package being installed
* Fixed issue where --no-dev autoload generation was excluding some
packages which should not have been excluded
* Added support for IPv6 addresses in NO_PROXY
* Added package homepage display in the show command
* Added debug info about HTTP authentications
* Added Symfony 5 compatibility
* Added --fixed flag to require command to make it use a fixed
constraint instead of a ^x.y constraint when adding the requirement
* Fixed exclude-from-classmap matching subsets of directories e.g. foo/
was excluding foobar/
* Fixed archive command to persist file permissions inside the zip files
* Fixed init/require command to avoid suggesting packages which are
already selected in the search results
* Fixed create-project UX issues
* Fixed filemtime for vendor/composer/* files is now only changing when
the files actually change
* Fixed issues detecting docker environment with an active open_basedir
- Version 1.9.3
* Fixed GitHub deprecation of access_token query parameter, now using
Authorization header
- Version 1.9.2
* Fixed minor git driver bugs
* Fixed schema validation for version field to allow dev-* versions too
* Fixed external processes' output being formatted even though it should
not
* Fixed issue with path repositories when trying to install feature
branches
- Version 1.9.1
* Fixed various credential handling issues with gitlab and github
* Fixed credentials being present in git remotes in Composer cache and
vendor directory when not using SSH keys
* Fixed composer why not listing replacers as a reason something is
present
* Fixed various PHP 7.4 compatibility issues
* Fixed root warnings always present in Docker containers, setting
COMPOSER_ALLOW_SUPERUSER is not necessary anymore
* Fixed GitHub access tokens leaking into debug-verbosity output
* Fixed several edge case issues detecting GitHub, Bitbucket and GitLab
repository types
* Fixed Composer asking if you want to use a composer.json in a parent
directory when ran in non-interactive mode
* Fixed classmap autoloading issue finding classes located within a few
non-PHP context blocks (?>...<?php)
- Version 1.9.0
* Added a --no-cache flag available on all commands to run with the
cache disabled
* Added PHP_BINARY as env var pointing to the PHP process when executing
Composer scripts as shell scripts
* Added a use-github-api config option which can set the no-api flag on
all GitHub VCS repositories declared
* Added a static helper you can preprend to a script to avoid process
timeouts, "Composer\\Config::disableProcessTimeout"
* Added Event::getOriginatingEvent to retrieve an event's original event
when a script handler forwards to another one
* Added support for autoloading directly from a phar file
* Fixed loading order of plugins to always initialize them in order
of dependencies
* Fixed various network-mount related issues
* Fixed --ignore-platform-reqs not ignoring conflict rules against
platform packages
- Version 1.8.6
* Fixed handling of backslash-escapes handling in compoesr.json when
using the require command
* Fixed create-project not following classmap-authoritative and
apcu-autoloader config values
* Fixed HHVM version warning showing up in some cases when it was not in
use
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1289=1
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2021-1289=1
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2021-1289=1
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2021-1289=1
Package List:
- openSUSE Leap 15.2 (noarch):
php-composer-1.10.22-lp152.2.3.1
- openSUSE Backports SLE-15-SP3 (noarch):
php-composer-1.10.22-bp153.2.3.1
- openSUSE Backports SLE-15-SP2 (noarch):
php-composer-1.10.22-bp152.2.3.1
- openSUSE Backports SLE-15-SP1 (noarch):
php-composer-1.10.22-bp151.3.3.1
References:
https://www.suse.com/security/cve/CVE-2021-29472.html
https://bugzilla.suse.com/1185376
https://bugzilla.suse.com/1187416
1
0
openSUSE-SU-2021:3140-1: moderate: Security update for xen
by opensuse-security@opensuse.org 18 Sep '21
by opensuse-security@opensuse.org 18 Sep '21
18 Sep '21
openSUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3140-1
Rating: moderate
References: #1027519 #1189632
Cross-References: CVE-2021-28701
CVSS scores:
CVE-2021-28701 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for xen fixes the following issues:
- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling
(XSA-384) (bsc#1189632).
- Upstream bug fixes (bsc#1027519)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3140=1
Package List:
- openSUSE Leap 15.3 (aarch64 x86_64):
xen-4.14.2_06-3.12.1
xen-debugsource-4.14.2_06-3.12.1
xen-devel-4.14.2_06-3.12.1
xen-doc-html-4.14.2_06-3.12.1
xen-libs-4.14.2_06-3.12.1
xen-libs-debuginfo-4.14.2_06-3.12.1
xen-tools-4.14.2_06-3.12.1
xen-tools-debuginfo-4.14.2_06-3.12.1
xen-tools-domU-4.14.2_06-3.12.1
xen-tools-domU-debuginfo-4.14.2_06-3.12.1
- openSUSE Leap 15.3 (x86_64):
xen-libs-32bit-4.14.2_06-3.12.1
xen-libs-32bit-debuginfo-4.14.2_06-3.12.1
- openSUSE Leap 15.3 (noarch):
xen-tools-xendomains-wait-disk-4.14.2_06-3.12.1
References:
https://www.suse.com/security/cve/CVE-2021-28701.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1189632
1
0
openSUSE-SU-2021:3123-1: moderate: Security update for libcroco
by opensuse-security@opensuse.org 16 Sep '21
by opensuse-security@opensuse.org 16 Sep '21
16 Sep '21
openSUSE Security Update: Security update for libcroco
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3123-1
Rating: moderate
References: #1171685
Cross-References: CVE-2020-12825
CVSS scores:
CVE-2020-12825 (NVD) : 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2020-12825 (SUSE): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libcroco fixes the following issues:
- CVE-2020-12825: Fixed recursion issue in block and any productions
(bsc#1171685).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3123=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libcroco-0.6.13-3.3.1
libcroco-0_6-3-0.6.13-3.3.1
libcroco-0_6-3-debuginfo-0.6.13-3.3.1
libcroco-debuginfo-0.6.13-3.3.1
libcroco-debugsource-0.6.13-3.3.1
libcroco-devel-0.6.13-3.3.1
- openSUSE Leap 15.3 (x86_64):
libcroco-0_6-3-32bit-0.6.13-3.3.1
libcroco-0_6-3-32bit-debuginfo-0.6.13-3.3.1
References:
https://www.suse.com/security/cve/CVE-2020-12825.html
https://bugzilla.suse.com/1171685
1
0
openSUSE-SU-2021:1279-1: moderate: Security update for haserl
by opensuse-security@opensuse.org 16 Sep '21
by opensuse-security@opensuse.org 16 Sep '21
16 Sep '21
openSUSE Security Update: Security update for haserl
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1279-1
Rating: moderate
References: #1187671
Cross-References: CVE-2021-29133
Affected Products:
openSUSE Leap 15.2
openSUSE Backports SLE-15-SP3
openSUSE Backports SLE-15-SP2
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for haserl fixes the following issues:
Update to version 0.9.36:
* Fixed: Its possible to issue a PUT request without a CONTENT-TYPE.
Assume an octet-stream in that case. This is CVE-2021-29133 and
boo#1187671
* Change the Prefix for variables to be the REQUEST_METHOD
(PUT/DELETE/GET/POST) THIS IS A BREAKING CHANGE
* Mitigations vs running haserl to get access to files not available to
the user.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1279=1
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2021-1279=1
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2021-1279=1
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2021-1279=1
Package List:
- openSUSE Leap 15.2 (x86_64):
haserl-0.9.36-lp152.4.3.1
haserl-debuginfo-0.9.36-lp152.4.3.1
haserl-debugsource-0.9.36-lp152.4.3.1
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
haserl-0.9.36-bp153.2.3.1
haserl-debuginfo-0.9.36-bp153.2.3.1
haserl-debugsource-0.9.36-bp153.2.3.1
- openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):
haserl-0.9.36-bp152.4.3.1
haserl-debuginfo-0.9.36-bp152.4.3.1
haserl-debugsource-0.9.36-bp152.4.3.1
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
haserl-0.9.36-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2021-29133.html
https://bugzilla.suse.com/1187671
1
0
openSUSE-SU-2021:1274-1: important: Security update for fail2ban
by opensuse-security@opensuse.org 16 Sep '21
by opensuse-security@opensuse.org 16 Sep '21
16 Sep '21
openSUSE Security Update: Security update for fail2ban
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1274-1
Rating: important
References: #1145181 #1146856 #1180738 #1188610
Cross-References: CVE-2021-32749
CVSS scores:
CVE-2021-32749 (NVD) : 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.2
openSUSE Backports SLE-15-SP3
openSUSE Backports SLE-15-SP2
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
This update for fail2ban fixes the following issues:
- CVE-2021-32749: prevent a command injection via mail command
(boo#1188610)
- Integrate change to resolve boo#1146856 and boo#1180738
Update to 0.11.2
- increased stability, filter and action updates
New Features and Enhancements
* fail2ban-regex:
- speedup formatted output (bypass unneeded stats creation)
- extended with prefregex statistic
- more informative output for `datepattern` (e. g. set from filter) -
pattern : description
* parsing of action in jail-configs considers space between action-names
as separator also (previously only new-line was allowed), for example
`action = a b` would specify 2 actions `a` and `b`
* new filter and jail for GitLab recognizing failed application logins
(gh#fail2ban/fail2ban#2689)
* new filter and jail for Grafana recognizing failed application logins
(gh#fail2ban/fail2ban#2855)
* new filter and jail for SoftEtherVPN recognizing failed application
logins (gh#fail2ban/fail2ban#2723)
* `filter.d/guacamole.conf` extended with `logging` parameter to follow
webapp-logging if it's configured (gh#fail2ban/fail2ban#2631)
* `filter.d/bitwarden.conf` enhanced to support syslog
(gh#fail2ban/fail2ban#2778)
* introduced new prefix `{UNB}` for `datepattern` to disable word
boundaries in regex;
* datetemplate: improved anchor detection for capturing groups `(^...)`;
* datepattern: improved handling with wrong recognized timestamps
(timezones, no datepattern, etc) as well as some warnings signaling user
about invalid pattern or zone (gh#fail2ban/fail2ban#2814):
- filter gets mode in-operation, which gets activated if filter starts
processing of new messages; in this mode a timestamp read from
log-line that appeared recently (not an old line), deviating too much
from now (up too 24h), will be considered as now (assuming a timezone
issue), so could avoid unexpected bypass of failure (previously
exceeding `findtime`);
- better interaction with non-matching optional datepattern or invalid
timestamps;
- implements special datepattern `{NONE}` - allow to find failures
totally without date-time in log messages, whereas filter will use now
as timestamp (gh#fail2ban/fail2ban#2802)
* performance optimization of `datepattern` (better search algorithm in
datedetector, especially for single template);
* fail2ban-client: extended to unban IP range(s) by subnet (CIDR/mask) or
hostname (DNS), gh#fail2ban/fail2ban#2791;
* extended capturing of alternate tags in filter, allowing combine of
multiple groups to single tuple token with new tag prefix `<F-TUPLE_`,
that would combine value of `<F-V>` with all value of `<F-TUPLE_V?_n?>`
tags (gh#fail2ban/fail2ban#2755)
- Fixes
* [stability] prevent race condition - no ban if filter (backend) is
continuously busy if too many messages will be found in log, e. g.
initial scan of large log-file or journal (gh#fail2ban/fail2ban#2660)
* pyinotify-backend sporadically avoided initial scanning of log-file by
start
* python 3.9 compatibility (and Travis CI support)
* restoring a large number (500+ depending on files ulimit) of current
bans when using PyPy fixed
* manual ban is written to database, so can be restored by restart
(gh#fail2ban/fail2ban#2647)
* `jail.conf`: don't specify `action` directly in jails (use `action_` or
`banaction` instead)
* no mails-action added per default anymore (e. g. to allow that `action =
%(action_mw)s` should be specified per jail or in default section in
jail.local), closes gh#fail2ban/fail2ban#2357
* ensure we've unique action name per jail (also if parameter `actname` is
not set but name deviates from standard name, gh#fail2ban/fail2ban#2686)
* don't use `%(banaction)s` interpolation because it can be complex value
(containing `[...]` and/or quotes), so would bother the action
interpolation
* fixed type conversion in config readers (take place after all
interpolations get ready), that allows to specify typed parameters
variable (as substitutions) as well as to supply it in other sections or
as init parameters.
* `action.d/*-ipset*.conf`: several ipset actions fixed (no timeout per
default anymore), so no discrepancy between ipset and fail2ban (removal
from ipset will be managed by fail2ban only, gh#fail2ban/fail2ban#2703)
* `action.d/cloudflare.conf`: fixed `actionunban` (considering new-line
chars and optionally real json-parsing with `jq`,
gh#fail2ban/fail2ban#2140, gh#fail2ban/fail2ban#2656)
* `action.d/nftables.conf` (type=multiport only): fixed port range
selector, replacing `:` with `-` (gh#fail2ban/fail2ban#2763)
* `action.d/firewallcmd-*.conf` (multiport only): fixed port range
selector, replacing `:` with `-` (gh#fail2ban/fail2ban#2821)
* `action.d/bsd-ipfw.conf`: fixed selection of rule-no by large list or
initial `lowest_rule_num` (gh#fail2ban/fail2ban#2836)
* `filter.d/common.conf`: avoid substitute of default values in related
`lt_*` section, `__prefix_line` should be interpolated in definition
section (inside the filter-config, gh#fail2ban/fail2ban#2650)
* `filter.d/dovecot.conf`:
- add managesieve and submission support (gh#fail2ban/fail2ban#2795);
- accept messages with more verbose logging (gh#fail2ban/fail2ban#2573);
* `filter.d/courier-smtp.conf`: prefregex extended to consider port in
log-message (gh#fail2ban/fail2ban#2697)
* `filter.d/traefik-auth.conf`: filter extended with parameter mode
(`normal`, `ddos`, `aggressive`) to handle the match of username
differently (gh#fail2ban/fail2ban#2693):
- `normal`: matches 401 with supplied username only
- `ddos`: matches 401 without supplied username only
- `aggressive`: matches 401 and any variant (with and without username)
* `filter.d/sshd.conf`: normalizing of user pattern in all RE's, allowing
empty user (gh#fail2ban/fail2ban#2749)
Update to 0.11.1:
* Increment ban time (+ observer) functionality introduced.
* Database functionality extended with bad ips.
* New tags (usable in actions):
- `<bancount>` - ban count of this offender if known as bad (started by
1 for unknown)
- `<bantime>` - current ban-time of the ticket (prolongation can be
retarded up to 10 sec.)
* Introduced new action command `actionprolong` to prolong ban-time (e. g.
set new timeout if expected);
* algorithm of restore current bans after restart changed: update the
restored ban-time (and therefore end of ban) of the ticket with ban-time
of jail (as maximum), for all tickets with ban-time greater (or
persistent)
* added new setup-option `--without-tests` to skip building and installing
of tests files (gh-2287).
* added new command `fail2ban-client get <JAIL> banip
?sep-char|--with-time?` to get the banned ip addresses (gh-1916).
* purge database will be executed now (within observer). restoring
currently banned ip after service restart fixed (now < timeofban +
bantime), ignore old log failures (already banned)
* upgrade database: update new created table `bips` with entries from
table `bans` (allows restore current bans after upgrade from version <=
0.10)
- removal of SuSEfirewall2-fail2ban for factory versions since
SuSEfirewall2 will be removed from Factory (see sr#713247):
* removed references to SuSEfirewall2 service
* use references to SuSEfirewall2 only for older distributions
* Removed installation recommendation of the fail2ban-SuSEfirewall2
package for all distributions as it is deprecated.
- changed fail2ban unit file location (boo#1145181,
gh#fail2ban/fail2ban#2474)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1274=1
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2021-1274=1
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2021-1274=1
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2021-1274=1
Package List:
- openSUSE Leap 15.2 (noarch):
fail2ban-0.11.2-lp152.3.3.1
monitoring-plugins-fail2ban-0.11.2-lp152.3.3.1
- openSUSE Backports SLE-15-SP3 (noarch):
fail2ban-0.11.2-bp153.2.3.1
monitoring-plugins-fail2ban-0.11.2-bp153.2.3.1
- openSUSE Backports SLE-15-SP2 (noarch):
fail2ban-0.11.2-bp152.4.3.1
monitoring-plugins-fail2ban-0.11.2-bp152.4.3.1
- openSUSE Backports SLE-15-SP1 (noarch):
fail2ban-0.11.2-bp151.3.3.1
monitoring-plugins-fail2ban-0.11.2-bp151.3.3.1
References:
https://www.suse.com/security/cve/CVE-2021-32749.html
https://bugzilla.suse.com/1145181
https://bugzilla.suse.com/1146856
https://bugzilla.suse.com/1180738
https://bugzilla.suse.com/1188610
1
0
openSUSE-SU-2021:1276-1: moderate: Security update for wireshark
by opensuse-security@opensuse.org 16 Sep '21
by opensuse-security@opensuse.org 16 Sep '21
16 Sep '21
openSUSE Security Update: Security update for wireshark
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1276-1
Rating: moderate
References: #1188375
Cross-References: CVE-2021-22235
CVSS scores:
CVE-2021-22235 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for wireshark fixes the following issues:
- Update to Wireshark 3.4.7
- CVE-2021-22235: Fixed DNP dissector crash (bsc#1188375).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1276=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
libwireshark14-3.4.7-lp152.2.18.1
libwireshark14-debuginfo-3.4.7-lp152.2.18.1
libwiretap11-3.4.7-lp152.2.18.1
libwiretap11-debuginfo-3.4.7-lp152.2.18.1
libwsutil12-3.4.7-lp152.2.18.1
libwsutil12-debuginfo-3.4.7-lp152.2.18.1
wireshark-3.4.7-lp152.2.18.1
wireshark-debuginfo-3.4.7-lp152.2.18.1
wireshark-debugsource-3.4.7-lp152.2.18.1
wireshark-devel-3.4.7-lp152.2.18.1
wireshark-ui-qt-3.4.7-lp152.2.18.1
wireshark-ui-qt-debuginfo-3.4.7-lp152.2.18.1
References:
https://www.suse.com/security/cve/CVE-2021-22235.html
https://bugzilla.suse.com/1188375
1
0