openSUSE Updates
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
December 2022
- 2 participants
- 173 discussions
SUSE-SU-2022:4504-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 16 Dec '22
by opensuse-security@opensuse.org 16 Dec '22
16 Dec '22
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:4504-1
Rating: important
References: #1065729 #1156395 #1164051 #1184350 #1189297
#1190256 #1193629 #1194869 #1202341 #1203183
#1204631 #1204636 #1204693 #1204810 #1204850
#1205007 #1205100 #1205111 #1205128 #1205130
#1205149 #1205153 #1205220 #1205331 #1205428
#1205473 #1205514 #1205617 #1205653 #1205744
#1205764 #1205796 #1205882 #1205993 #1206035
#1206036 #1206037 #1206046 #1206047 #1206051
#1206056 #1206057 #1206113 #1206114 #1206147
#1206149 #1206207 #1206273 PED-1573 PED-1706
PED-1936 PED-2684 PED-611 PED-824 PED-849
Cross-References: CVE-2022-2602 CVE-2022-3176 CVE-2022-3566
CVE-2022-3567 CVE-2022-3635 CVE-2022-3643
CVE-2022-3707 CVE-2022-3903 CVE-2022-4095
CVE-2022-4129 CVE-2022-4139 CVE-2022-41850
CVE-2022-41858 CVE-2022-42328 CVE-2022-42329
CVE-2022-42895 CVE-2022-42896 CVE-2022-4378
CVE-2022-43945 CVE-2022-45869 CVE-2022-45888
CVE-2022-45934
CVSS scores:
CVE-2022-2602 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3176 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3176 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3566 (NVD) : 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3566 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3567 (NVD) : 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3567 (SUSE): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3635 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3635 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3643 (NVD) : 10 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVE-2022-3643 (SUSE): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-3707 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3903 (NVD) : 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3903 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-4095 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-4129 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-4129 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-4139 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-41850 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-41850 (SUSE): 4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
CVE-2022-41858 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42328 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42328 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42329 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42329 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42895 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2022-42895 (SUSE): 6.8 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
CVE-2022-42896 (NVD) : 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42896 (SUSE): 6.8 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2022-4378 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-43945 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-43945 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-45869 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-45869 (SUSE): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-45888 (NVD) : 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-45888 (SUSE): 4 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
CVE-2022-45934 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-45934 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Public Cloud 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves 22 vulnerabilities, contains 7
features and has 26 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).
- CVE-2022-42328: Guests could trigger denial of service via the netback
driver (bnc#1206114).
- CVE-2022-42329: Guests could trigger denial of service via the netback
driver (bnc#1206113).
- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via
netback driver (bnc#1206113).
- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file
drivers/atm/idt77252.c of the component IPsec (bsc#1204631). -
CVE-2022-41850: Fixed a race condition in roccat_report_event() in
drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in
l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3567: Fixed a to race condition in
inet6_stream_ops()/inet6_dgram_ops() of the component IPv6 Handler
(bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in
drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation
(bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver
USB driver (bsc#1205220).
- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which
could cause a denial of service (bsc#1205882).
- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB
devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).
- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU
to access any physical memory (bsc#1205700).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling
Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a
race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2022-42896: Fixed a use-after-free vulnerability in the
net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req()
which may have allowed code execution and leaking kernel memory
(respectively) remotely via Bluetooth (bsc#1205709).
- CVE-2022-42895: Fixed an information leak in the
net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to
leak kernel pointers remotely (bsc#1205705).
- CVE-2022-3566: Fixed a race condition in the functions
tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The
manipulation leads to race condition (bsc#1204405).
- CVE-2022-2602: Fixed a local privilege escalation vulnerability
involving Unix socket Garbage Collection and io_uring (bsc#1204228).
- CVE-2022-3176: Fixed a use-after-free in io_uring related to
signalfd_poll() and binder_poll() (bsc#1203391).
- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver
(bsc#1204780).
- CVE-2022-41850: Fixed a use-after-free in roccat_report_event in
drivers/hid/hid-roccat.c (bnc#1203960).
The following non-security bugs were fixed:
- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).
- ACPI: HMAT: Fix initiator registration for single-initiator systems
(git-fixes).
- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).
- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).
- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable
(git-fixes).
- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).
- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for more AMD display audio
(git-fixes).
- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360
(bsc#1205100).
- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro
(bsc#1205100).
- ALSA: hda: fix potential memleak in 'add_widget_node' (git-fixes).
- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).
- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).
- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()
(git-fixes).
- ALSA: usb-audio: Remove redundant workaround for Roland quirk
(bsc#1205111).
- ALSA: usb-audio: Yet more regression for for the delayed card
registration (bsc#1205111).
- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue
(git-fixes).
- ARM: at91: rm9200: fix usb device clock id (git-fixes).
- ARM: dts: am335x-pcm-953: Define fixed regulators in root node
(git-fixes).
- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).
- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties
(git-fixes).
- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).
- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).
- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).
- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).
- ASoC: codecs: jz4725b: Fix spelling mistake "Sourc" -> "Source",
"Routee" -> "Route" (git-fixes).
- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).
- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).
- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).
- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).
- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).
- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).
- ASoC: fsl_sai: use local device pointer (git-fixes).
- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).
- ASoC: mt6660: Keep the pm_runtime enables before component stuff in
mt6660_i2c_probe (git-fixes).
- ASoC: ops: Fix bounds check for _sx controls (git-fixes).
- ASoC: rt1019: Fix the TDM settings (git-fixes).
- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).
- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).
- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).
- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).
- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).
- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).
- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn()
(git-fixes).
- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
(git-fixes).
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory
(git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).
- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).
- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)
- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).
- Drivers: hv: Fix syntax errors in comments (git-fixes).
- Drivers: hv: Never allocate anything besides framebuffer from
framebuffer memory region (git-fixes).
- Drivers: hv: fix repeated words in comments (git-fixes).
- Drivers: hv: remove duplicate word in a comment (git-fixes).
- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).
- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).
- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization
(git-fixes).
- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).
- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).
- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).
- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better
discoverability (git-fixes).
- Drivers: hv: vmbus: fix double free in the error path of
vmbus_add_channel_work() (git-fixes).
- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
(git-fixes).
- Drivers: hv: vmbus: fix typo in comment (git-fixes).
- Fix formatting of client smbdirect RDMA logging (bsc#1193629).
- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).
- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).
- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).
- HID: playstation: add initial DualSense Edge controller support
(git-fixes).
- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).
- Handle variable number of SGEs in client smbdirect send (bsc#1193629).
- IB/hfi1: Correctly move list in sc_disable() (git-fixes)
- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)
- Input: goodix - try resetting the controller when no config is set
(git-fixes).
- Input: i8042 - fix leaking of platform device on module removal
(git-fixes).
- Input: iforce - invert valid length check when fetching device IDs
(git-fixes).
- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send()
(git-fixes).
- Input: soc_button_array - add Acer Switch V 10 to
dmi_use_low_level_irq[] (git-fixes).
- Input: soc_button_array - add use_low_level_irq module parameter
(git-fixes).
- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode
(git-fixes).
- KVM: Move wiping of the kvm->vcpus array to common code (git-fixes).
- KVM: SEV: Mark nested locking of vcpu->lock (git-fixes).
- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).
- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is
supported (git-fixes).
- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).
- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).
- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm
(git-fixes).
- KVM: SVM: retrieve VMCB from assembly (git-fixes).
- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL
(git-fixes).
- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS
(git-fixes).
- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there's no
vPMU (git-fixes).
- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled
(bsc#1205007).
- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable
(git-fixes).
- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
(git-fixes).
- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists
(git-fixes).
- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}()
(git-fixes).
- KVM: s390: Add a routine for setting userspace CPU state (git-fixes
jsc#PED-611).
- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).
- KVM: s390: pv: do not allow userspace to set the clock under PV
(git-fixes).
- KVM: s390: pv: leak the topmost page table when destroy fails
(git-fixes).
- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap
(git-fixes).
- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path
(git-fixes).
- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).
- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic
(git-fixes).
- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog
(git-fixes).
- KVM: x86/pmu: Use different raw event masks for AMD and Intel
(git-fixes).
- KVM: x86/svm: Account for family 17h event renumberings in
amd_pmc_perf_hw_id (git-fixes).
- KVM: x86: Fully initialize 'struct kvm_lapic_irq' in
kvm_pv_kick_cpu_op() (git-fixes).
- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).
- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails
(git-fixes).
- KVM: x86: Retry page fault if MMU reload is pending and root has no sp
(bsc#1205744).
- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS)
(git-fixes).
- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1)
(git-fixes).
- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses
(git-fixes).
- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits
(git-fixes).
- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).
- KVM: x86: emulator: em_sysexit should update ctxt->mode (git-fixes).
- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).
- KVM: x86: emulator: update the emulation mode after CR0 write
(git-fixes).
- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).
- KVM: x86: use a separate asm-offsets.c file (git-fixes).
- Kconfig: Add option for asm goto w/ tied outputs to workaround clang-13
bug (git-fixes).
- MIPS: Loongson: Use hwmon_device_register_with_groups() to register
hwmon (git-fixes).
- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).
- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).
- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions
to pci_ids.h (git-fixes).
- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg()
(git-fixes).
- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)
- RDMA/cm: Use SLID in the work completion as the DLID in responder side
(git-fixes)
- RDMA/cma: Use output interface for net_dev check (git-fixes)
- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)
- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)
- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)
- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)
- RDMA/hns: Correct the type of variables participating in the shift
operation (git-fixes)
- RDMA/hns: Disable local invalidate operation (git-fixes)
- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)
- RDMA/hns: Fix supported page size (git-fixes)
- RDMA/hns: Fix wrong fixed value of qp->rq.wqe_shift (git-fixes)
- RDMA/hns: Remove magic number (git-fixes)
- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)
- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)
- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP
(git-fixes)
- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)
- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx()
(git-fixes)
- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)
- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)
- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)
- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources()
(git-fixes)
- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)
- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)
- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)
- RDMA/rxe: Remove useless pkt parameters (git-fixes)
- Reduce client smbdirect max receive segment size (bsc#1193629).
- Revert "net: phy: meson-gxl: improve link-up behavior" (git-fixes).
- Revert "tty: n_gsm: avoid call of sleeping functions from atomic
context" (git-fixes).
- Revert "tty: n_gsm: replace kicktimer with delayed_work" (git-fixes).
- Revert "usb: dwc3: disable USB core PHY management" (git-fixes).
- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).
- SMB3: fix lease break timeout when multiple deferred close handles for
the same file (bsc#1193629).
- USB: bcma: Make GPIO explicitly optional (git-fixes).
- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).
- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
- USB: serial: option: remove old LARA-R6 PID (git-fixes).
- arcnet: fix potential memory leak in com20020_probe() (git-fixes).
- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header
(git-fixes).
- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).
- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)
- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).
- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).
- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed
(git-fixes).
- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are
allowed (git-fixes).
- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed
(git-fixes).
- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed
(git-fixes).
- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4
(git-fixes).
- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock
frequency (git-fixes).
- arm64: efi: Fix handling of misaligned runtime regions and drop warning
(git-fixes).
- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes).
Enable CONFIG_ARM64_ERRATUM_2441007, too
- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable
CONFIG_ARM64_ERRATUM_1742098 in arm64/default
- arm64: fix rodata=full again (git-fixes)
- ata: libata-core: do not issue non-internal commands once EH is pending
(git-fixes).
- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).
- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).
- ata: libata-transport: fix double ata_host_put() in ata_tport_add()
(git-fixes).
- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).
- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref()
(git-fixes).
- blk-mq: Properly init requests from blk_mq_alloc_request_hctx()
(git-fixes).
- blk-mq: do not create hctx debugfs dir until q->debugfs_dir is created
(git-fixes).
- blk-mq: fix io hung due to missing commit_rqs (git-fixes).
- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).
- blktrace: Trace remapped requests correctly (git-fixes).
- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).
- block: add bio_start_io_acct_time() to control start_time (git-fixes).
- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for
nowait (git-fixes).
- block: drop unused includes in <linux/genhd.h> (git-fixes).
- bridge: switchdev: Fix memory leaks when changing VLAN protocol
(git-fixes).
- btrfs: check if root is readonly while setting security xattr
(bsc#1206147).
- btrfs: do not allow compression on nodatacow files (bsc#1206149).
- btrfs: export a helper for compression hard check (bsc#1206149).
- btrfs: fix processing of delayed data refs during backref walking
(bsc#1206056).
- btrfs: fix processing of delayed tree block refs during backref walking
(bsc#1206057).
- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).
- btrfs: send: always use the rbtree based inode ref management
infrastructure (bsc#1206036).
- btrfs: send: fix failures when processing inodes with no links
(bsc#1206036).
- btrfs: send: fix send failure of a subcase of orphan inodes
(bsc#1206036).
- btrfs: send: fix sending link commands for existing file paths
(bsc#1206036).
- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free
(bsc#1206036).
- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).
- btrfs: send: remove unused found_type parameter to
lookup_dir_item_inode() (bsc#1206036).
- btrfs: send: remove unused type parameter to iterate_inode_ref_t
(bsc#1206036).
- btrfs: send: use boolean types for current inode status (bsc#1206036).
- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).
- bus: sunxi-rsb: Support atomic transfers (git-fixes).
- ca8210: Fix crash by zero initializing data (git-fixes).
- can: af_can: fix NULL pointer dereference in can_rx_register()
(git-fixes).
- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).
- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev()
(git-fixes).
- can: j1939: j1939_send_one(): fix missing CAN header initialization
(git-fixes).
- can: m_can: Add check for devm_clk_get (git-fixes).
- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove
methods (git-fixes).
- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev()
(git-fixes).
- capabilities: fix potential memleak on error path from
vfs_getxattr_alloc() (git-fixes).
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
(git-fixes).
- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).
- ceph: avoid putting the realm twice when decoding snaps fails
(bsc#1206051).
- ceph: do not update snapshot context when there is no new snapshot
(bsc#1206047).
- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).
- ceph: fix memory leak in ceph_readdir when note_last_dentry returns
error (bsc#1206049).
- ceph: properly handle statfs on multifs setups (bsc#1206045).
- ceph: switch netfs read ops to use rreq->inode instead of
rreq->mapping->host (bsc#1206046).
- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).
- cifs: Add constructor/destructors for tcon->cfid (bsc#1193629).
- cifs: Add helper function to check smb1+ server (bsc#1193629).
- cifs: Do not access tcon->cfids->cfid directly from is_path_accessible
(bsc#1193629).
- cifs: Do not use tcon->cfid directly, use the cfid we get from
open_cached_dir (bsc#1193629).
- cifs: Fix connections leak when tlink setup failed (git-fixes).
- cifs: Fix memory leak on the deferred close (bsc#1193629).
- cifs: Fix memory leak when build ntlmssp negotiate blob failed
(bsc#1193629).
- cifs: Fix pages array leak when writedata alloc failed in
cifs_writedata_alloc() (bsc#1193629).
- cifs: Fix pages leak when writedata alloc failed in
cifs_write_from_iter() (bsc#1193629).
- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message
(bsc#1193629).
- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).
- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).
- cifs: Fix xid leak in cifs_create() (bsc#1193629).
- cifs: Fix xid leak in cifs_flock() (bsc#1193629).
- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).
- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).
- cifs: Make tcon contain a wrapper structure cached_fids instead of
cached_fid (bsc#1193629).
- cifs: Move cached-dir functions into a separate file (bsc#1193629).
- cifs: Replace a couple of one-element arrays with flexible-array members
(bsc#1193629).
- cifs: Use after free in debug code (git-fixes).
- cifs: Use help macro to get the header preamble size (bsc#1193629).
- cifs: Use help macro to get the mid header size (bsc#1193629).
- cifs: add check for returning value of SMB2_close_init (git-fixes).
- cifs: add check for returning value of SMB2_set_info_init (git-fixes).
- cifs: add missing spinlock around tcon refcount (bsc#1193629).
- cifs: alloc_mid function should be marked as static (bsc#1193629).
- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).
- cifs: always iterate smb sessions using primary channel (bsc#1193629).
- cifs: avoid deadlocks while updating iface (bsc#1193629).
- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).
- cifs: avoid use of global locks for high contention data (bsc#1193629).
- cifs: cache the dirents for entries in a cached directory (bsc#1193629).
- cifs: change iface_list from array to sorted linked list (bsc#1193629).
- cifs: destage dirty pages before re-reading them for cache=none
(bsc#1193629).
- cifs: do not send down the destination address to sendmsg for a
SOCK_STREAM (bsc#1193629).
- cifs: drop the lease for cached directories on rmdir or rename
(bsc#1193629).
- cifs: during reconnect, update interface if necessary (bsc#1193629).
- cifs: enable caching of directories for which a lease is held
(bsc#1193629).
- cifs: find and use the dentry for cached non-root directories also
(bsc#1193629).
- cifs: fix double-fault crash during ntlmssp (bsc#1193629).
- cifs: fix lock length calculation (bsc#1193629).
- cifs: fix memory leaks in session setup (bsc#1193629).
- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).
- cifs: fix race condition with delayed threads (bsc#1193629).
- cifs: fix skipping to incorrect offset in emit_cached_dirents
(bsc#1193629).
- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).
- cifs: fix static checker warning (bsc#1193629).
- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).
- cifs: fix use-after-free caused by invalid pointer `hostname`
(bsc#1193629).
- cifs: fix use-after-free on the link name (bsc#1193629).
- cifs: fix wrong unlock before return from cifs_tree_connect()
(bsc#1193629).
- cifs: improve handlecaching (bsc#1193629).
- cifs: improve symlink handling for smb2+ (bsc#1193629).
- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).
- cifs: lease key is uninitialized in two additional functions when smb1
(bsc#1193629).
- cifs: list_for_each() -> list_for_each_entry() (bsc#1193629).
- cifs: misc: fix spelling typo in comment (bsc#1193629).
- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).
- cifs: periodically query network interfaces from server (bsc#1193629).
- cifs: populate empty hostnames for extra channels (bsc#1193629).
- cifs: prevent copying past input buffer boundaries (bsc#1193629).
- cifs: remove "cifs_" prefix from init/destroy mids functions
(bsc#1193629).
- cifs: remove initialization value (bsc#1193629).
- cifs: remove minor build warning (bsc#1193629).
- cifs: remove redundant initialization to variable mnt_sign_enabled
(bsc#1193629).
- cifs: remove remaining build warnings (bsc#1193629).
- cifs: remove some camelCase and also some static build warnings
(bsc#1193629).
- cifs: remove unnecessary (void*) conversions (bsc#1193629).
- cifs: remove unnecessary locking of chan_lock while freeing session
(bsc#1193629).
- cifs: remove unnecessary type castings (bsc#1193629).
- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).
- cifs: remove useless DeleteMidQEntry() (bsc#1193629).
- cifs: remove useless parameter 'is_fsctl' from SMB2_ioctl()
(bsc#1193629).
- cifs: replace kfree() with kfree_sensitive() for sensitive data
(bsc#1193629).
- cifs: return correct error in ->calc_signature() (bsc#1193629).
- cifs: return errors during session setup during reconnects (bsc#1193629).
- cifs: revalidate mapping when doing direct writes (bsc#1193629).
- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).
- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir
(bsc#1193629).
- cifs: skip extra NULL byte in filenames (bsc#1193629).
- cifs: store a pointer to a fid in the cfid structure instead of the
struct (bsc#1193629).
- cifs: truncate the inode and mapping when we simulate fcollapse
(bsc#1193629).
- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).
- cifs: update internal module number (bsc#1193629).
- cifs: use ALIGN() and round_up() macros (bsc#1193629).
- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).
- cifs: when a channel is not found for server, log its connection id
(bsc#1193629).
- cifs: when insecure legacy is disabled shrink amount of SMB1 code
(bsc#1193629).
- clocksource/drivers/hyperv: add data structure for reference TSC MSR
(git-fixes).
- cpufreq: intel_pstate: Handle no_turbo in frequency invariance
(jsc#PED-849).
- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).
- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).
- dm btree remove: fix use after free in rebalance_children() (git-fixes).
- dm crypt: make printing of the key constant-time (git-fixes).
- dm era: commit metadata in postsuspend after worker stops (git-fixes).
- dm integrity: fix memory corruption when tag_size is less than digest
size (git-fixes).
- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).
- dm raid: fix accesses beyond end of raid member array (git-fixes).
- dm stats: add cond_resched when looping over entries (git-fixes).
- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback
(git-fixes).
- dm: fix double accounting of flush with data (git-fixes).
- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).
- dm: properly fix redundant bio-based IO accounting (git-fixes).
- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).
- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).
- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).
- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).
- dmaengine: at_hdmac: Check return code of dma_async_device_register
(git-fixes).
- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable
(git-fixes).
- dmaengine: at_hdmac: Do not call the complete callback on
device_terminate_all (git-fixes).
- dmaengine: at_hdmac: Do not start transactions at tx_submit level
(git-fixes).
- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).
- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of
errors (git-fixes).
- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).
- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).
- dmaengine: at_hdmac: Fix concurrency problems by removing
atc_complete_all() (git-fixes).
- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware
(git-fixes).
- dmaengine: at_hdmac: Fix impossible condition (git-fixes).
- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending
(git-fixes).
- dmaengine: at_hdmac: Free the memset buf without holding the chan lock
(git-fixes).
- dmaengine: at_hdmac: Protect atchan->status with the channel lock
(git-fixes).
- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending
(git-fixes).
- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove()
(git-fixes).
- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).
- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail
(git-fixes).
- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).
- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).
- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).
- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).
- drm/amdgpu: set vm_update_mode=0 as default for Sienna Cichlid in SRIOV
case (git-fixes).
- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram()
(git-fixes).
- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).
- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).
- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).
- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).
- drm/hyperv: Add ratelimit on error message (git-fixes).
- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).
- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).
- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).
- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).
- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid
(git-fixes).
- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).
- drm/msm/hdmi: fix IRQ lifetime (git-fixes).
- drm/panel: simple: set bpc field for logic technologies displays
(git-fixes).
- drm/rockchip: dsi: Force synchronous probe (git-fixes).
- drm/vc4: Fix missing platform_unregister_drivers() call in
vc4_drm_register() (git-fixes).
- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).
- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()
(git-fixes).
- e1000e: Fix TX dispatch condition (git-fixes).
- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).
- efi: random: Use 'ACPI reclaim' memory for random seed (git-fixes).
- efi: random: reduce seed size to 32 bytes (git-fixes).
- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).
- firmware: coreboot: Register bus in module init (git-fixes).
- fm10k: Fix error handling in fm10k_init_module() (git-fixes).
- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).
- ftrace: Fix the possible incorrect kernel message (git-fixes).
- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).
- ftrace: Optimize the allocation for mcount entries (git-fixes).
- fuse: add file_modified() to fallocate (bsc#1205332).
- fuse: fix readdir cache race (bsc#1205331).
- fuse: lock inode unconditionally in fuse_fallocate() (bsc#1206273).
- gpio: amd8111: Fix PCI device reference count leak (git-fixes).
- hamradio: fix issue of dev reference count leakage in bpq_device_event()
(git-fixes).
- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).
- hv_netvsc: Fix race between VF offering and VF association message from
host (bsc#1204850).
- hv_netvsc: Print value of invalid ID in
netvsc_send_{completion,tx_complete}() (git-fixes).
- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).
- hv_sock: Check hv_pkt_iter_first_raw()'s return value (git-fixes).
- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).
- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).
- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()
(git-fixes).
- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).
- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails
(git-fixes).
- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).
- hwmon: (ltc2947) fix temperature scaling (git-fixes).
- i2c: i801: add lis3lv02d's I2C address for Vostro 5568 (git-fixes).
- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).
- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).
- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).
- i2c: xiic: Add platform module alias (git-fixes).
- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).
- ieee802154: cc2520: Fix error return code in cc2520_hw_init()
(git-fixes).
- iio: adc: at91_adc: fix possible memory leak in
at91_adc_allocate_trigger() (git-fixes).
- iio: adc: mp2629: fix potential array out of bound access (git-fixes).
- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).
- iio: core: Fix entry not deleted when iio_register_sw_trigger_type()
fails (git-fixes).
- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).
- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw
(git-fixes).
- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).
- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).
- iio: ms5611: Simplify IO callback parameters (git-fixes).
- iio: pressure: ms5611: changed hardcoded SPI speed to value limited
(git-fixes).
- iio: pressure: ms5611: fixed value compensation bug (git-fixes).
- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init()
(git-fixes).
- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).
- intel_idle: Add AlderLake support (jsc#PED-824).
- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).
- intel_idle: Fix the 'preferred_cstates' module parameter (jsc#PED-824
jsc#PED-1936).
- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).
- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).
- io-wq: do not retry task_work creation failure on fatal conditions
(bnc#1205113).
- io-wq: ensure we exit if thread group is exiting (git-fixes).
- io-wq: exclusively gate signal based exit on get_signal() return
(git-fixes).
- io-wq: fix cancellation on create-worker failure (bnc#1205113).
- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).
- io_uring: correct __must_hold annotation (git-fixes).
- io_uring: drop ctx->uring_lock before acquiring sqd->lock (git-fixes).
- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL
(git-fixes).
- io_uring: fix io_timeout_remove locking (git-fixes).
- io_uring: fix missing mb() before waitqueue_active (git-fixes).
- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).
- io_uring: fix possible poll event lost in multi shot mode (git-fixes).
- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).
- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).
- kABI: Fix kABI after "KVM: x86/pmu: Use different raw event masks for
AMD and Intel" (git-fixes).
- kbuild: Unify options for BTF generation for vmlinux and modules
(bsc#1204693).
- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).
- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).
- mISDN: fix possible memory leak in mISDN_dsp_element_register()
(git-fixes).
- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).
- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).
- macsec: Fix invalid error code set (git-fixes).
- macsec: add missing attribute validation for offload (git-fixes).
- macsec: clear encryption keys from the stack after setting up offload
(git-fixes).
- macsec: delete new rxsc when offload fails (git-fixes).
- macsec: fix detection of RXSCs when toggling offloading (git-fixes).
- macsec: fix secy->n_rx_sc accounting (git-fixes).
- md/raid5: Ensure stripe_fill happens on non-read IO with journal
(git-fixes).
- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk()
(git-fixes).
- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).
- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).
- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).
- media: meson: vdec: fix possible refcount leak in vdec_probe()
(git-fixes).
- media: rkisp1: Do not pass the quantization to rkisp1_csm_config()
(git-fixes).
- media: rkisp1: Initialize color space on resizer sink and source pads
(git-fixes).
- media: rkisp1: Use correct macro for gradient registers (git-fixes).
- media: rkisp1: Zero v4l2_subdev_format fields in when validating links
(git-fixes).
- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).
- media: v4l: subdev: Fail graciously when getting try data for NULL state
(git-fixes).
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
(git-fixes).
- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).
- mmc: core: properly select voltage range without power cycle (git-fixes).
- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI
(git-fixes).
- mmc: mmc_test: Fix removal of debugfs file (git-fixes).
- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).
- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).
- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).
- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA
(git-fixes).
- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD#
debounce timeout (git-fixes).
- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put()
(git-fixes).
- mmc: sdhci-sprd: Fix no reset data and command after voltage switch
(git-fixes).
- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).
- mtd: parsers: bcm47xxpart: print correct offset on read error
(git-fixes).
- mtd: spi-nor: intel-spi: Disable write protection only if asked
(git-fixes).
- nbd: Fix incorrect error handle when first_minor is illegal in
nbd_dev_add (git-fixes).
- net/smc: Avoid overwriting the copies of clcsock callback functions
(git-fixes).
- net/smc: Fix an error code in smc_lgr_create() (git-fixes).
- net/smc: Fix possible access to freed memory in link clear (git-fixes).
- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).
- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).
- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).
- net/smc: Forward wakeup to smc socket waitqueue after fallback
(git-fixes).
- net/smc: Only save the original clcsock callback functions (git-fixes).
- net/smc: Send directly when TCP_CORK is cleared (git-fixes).
- net/smc: kABI workarounds for struct smc_link (git-fixes).
- net/smc: kABI workarounds for struct smc_sock (git-fixes).
- net/smc: send directly on setting TCP_NODELAY (git-fixes).
- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).
- net: ethernet: nixge: fix NULL dereference (git-fixes).
- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed
(git-fixes).
- net: ethernet: ti: am65-cpsw: fix error handling in
am65_cpsw_nuss_probe() (git-fixes).
- net: hyperv: remove use of bpf_op_t (git-fixes).
- net: mdio: fix unbalanced fwnode reference count in
mdio_device_release() (git-fixes).
- net: mdiobus: fix unbalanced node reference count (git-fixes).
- net: phy: fix null-ptr-deref while probe() failed (git-fixes).
- net: phy: marvell: add sleep time after enabling the loopback bit
(git-fixes).
- net: phy: mscc: macsec: clear encryption keys when freeing a flow
(git-fixes).
- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).
- net: stmmac: work around sporadic tx issue on link-up (git-fixes).
- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).
- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).
- net: thunderx: Fix the ACPI memory leak (git-fixes).
- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).
- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type
(git-fixes).
- net: wwan: iosm: fix kernel test robot reported error (git-fixes).
- nfc/nci: fix race with opening and closing (git-fixes).
- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()
(git-fixes).
- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).
- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send()
(git-fixes).
- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION
(git-fixes).
- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION
(git-fixes).
- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).
- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry()
(git-fixes).
- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).
- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty
(git-fixes).
- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).
- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition
failure (git-fixes).
- panic, kexec: make __crash_kexec() NMI safe (git-fixes).
- parport_pc: Avoid FIFO port location truncation (git-fixes).
- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).
- phy: stm32: fix an error code in probe (git-fixes).
- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map
(git-fixes).
- pinctrl: intel: Save and restore pins in "direct IRQ" mode (git-fixes).
- pinctrl: rockchip: list all pins in a possible mux route for PX30
(git-fixes).
- pinctrl: single: Fix potential division by zero (git-fixes).
- platform/surface: aggregator: Do not check for repeated unsequenced
packets (git-fixes).
- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684
bsc#1205683).
- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).
- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when
virtualized (git-fixes).
- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017)
(git-fixes).
- platform/x86: asus-wmi: add missing pci_dev_put() in
asus_wmi_set_xusb2pr() (git-fixes).
- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).
- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2
2-in-1 (git-fixes).
- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S
(bsc#1194869).
- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).
- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).
- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static
(bsc#1194869).
- proc: avoid integer type confusion in get_proc_long (git-fixes).
- proc: proc_skip_spaces() shouldn't think it is working on C strings
(git-fixes).
- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).
- regulator: core: fix UAF in destroy_regulator() (git-fixes).
- regulator: core: fix kobject release warning and memory leak in
regulator_register() (git-fixes).
- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).
- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).
- ring_buffer: Do not deactivate non-existant pages (git-fixes).
- s390/futex: add missing EX_TABLE entry to __futex_atomic_op()
(bsc#1205427 LTC#200502).
- s390/pci: add missing EX_TABLE entries to
__pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).
- s390/uaccess: add missing EX_TABLE entries to __clear_user(),
copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and
__strnlen_user() (bsc#1205428 LTC#200501).
- s390: fix nospec table alignments (git-fixes).
- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).
- sched: Disable sched domain debugfs creation on ppc64 unless
sched_verbose is specified (bnc#1205653).
- scripts/faddr2line: Fix regression in name resolution on ppc64le
(git-fixes).
- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).
- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).
- scsi: megaraid_sas: Correct value passed to scsi_device_lookup()
(git-fixes).
- scsi: mpt3sas: Fix return value check of dma_get_required_mask()
(git-fixes).
- scsi: qedf: Populate sysfs attributes for vport (git-fixes).
- scsi: scsi_transport_sas: Fix error handling in sas_phy_add()
(git-fixes).
- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).
- scsi: storvsc: Fix handling of srb_status and capacity change events
(git-fixes).
- scsi: storvsc: Fix typo in comment (git-fixes).
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).
- scsi: storvsc: remove an extraneous "to" in a comment (git-fixes).
- scsi: zfcp: Fix double free of FSF request when qdio send fails
(git-fixes).
- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).
- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).
- selftests: mptcp: make sendfile selftest work (git-fixes).
- selftests: mptcp: more stable simult_flows tests (git-fixes).
- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload
(git-fixes).
- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on ->set_termios()
(git-fixes).
- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).
- serial: 8250: Flush DMA Rx on RLSI (git-fixes).
- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in
omap8250_remove() (git-fixes).
- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).
- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).
- serial: 8250_omap: remove wait loop from Errata i202 workaround
(git-fixes).
- serial: imx: Add missing .thaw_noirq hook (git-fixes).
- siox: fix possible memory leak in siox_device_add() (git-fixes).
- slimbus: stream: correct presence rate frequencies (git-fixes).
- smb2: small refactor in smb2_check_message() (bsc#1193629).
- smb3: Move the flush out of smb2_copychunk_range() into its callers
(bsc#1193629).
- smb3: add dynamic trace points for tree disconnect (bsc#1193629).
- smb3: add trace point for SMB2_set_eof (bsc#1193629).
- smb3: allow deferred close timeout to be configurable (bsc#1193629).
- smb3: check xattr value length earlier (bsc#1193629).
- smb3: clarify multichannel warning (bsc#1193629).
- smb3: do not log confusing message when server returns no network
interfaces (bsc#1193629).
- smb3: fix empty netname context on secondary channels (bsc#1193629).
- smb3: fix oops in calculating shash_setkey (bsc#1193629).
- smb3: fix temporary data corruption in collapse range (bsc#1193629).
- smb3: fix temporary data corruption in insert range (bsc#1193629).
- smb3: improve SMB3 change notification support (bsc#1193629).
- smb3: interface count displayed incorrectly (bsc#1193629).
- smb3: missing inode locks in punch hole (bsc#1193629).
- smb3: missing inode locks in zero range (bsc#1193629).
- smb3: must initialize two ACL struct fields to zero (bsc#1193629).
- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).
- smb3: rename encryption/decryption TFMs (bsc#1193629).
- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait
(bsc#1193629).
- smb3: use netname when available on secondary channels (bsc#1193629).
- smb3: workaround negprot bug in some Samba servers (bsc#1193629).
- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).
- soundwire: intel: Initialize clock stop timeout (bsc#1205507).
- soundwire: qcom: check for outanding writes before doing a read
(git-fixes).
- soundwire: qcom: reinit broadcast completion (git-fixes).
- speakup: fix a segfault caused by switching consoles (git-fixes).
- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld()
(git-fixes).
- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input
clock (git-fixes).
- spi: stm32: Print summary 'callbacks suppressed' message (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every
run (git-fixes).
- spi: tegra210-quad: Fix duplicate resource error (git-fixes).
- thunderbolt: Add DP OUT resource when DP tunnel is discovered
(git-fixes).
- tools: hv: Remove an extraneous "the" (git-fixes).
- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).
- tools: iio: iio_generic_buffer: Fix read size (git-fixes).
- tracing/ring-buffer: Have polling block on watermark (git-fixes).
- tracing: Fix memory leak in test_gen_synth_cmd() and
test_empty_synth_event() (git-fixes).
- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).
- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).
- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd()
(git-fixes).
- tracing: kprobe: Fix potential null-ptr-deref on trace_array in
kprobe_event_gen_test_exit() (git-fixes).
- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in
kprobe_event_gen_test_exit() (git-fixes).
- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send
(git-fixes).
- tty: serial: fsl_lpuart: do not break the on-going transfer when global
reset (git-fixes).
- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).
- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).
- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).
- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).
- usb: dwc3: gadget: conditionally remove requests (git-fixes).
- usb: smsc: use eth_hw_addr_set() (git-fixes).
- usb: typec: mux: Enter safe mode only when pins need to be reconfigured
(git-fixes).
- usb: xhci-mtk: check boundary before check tt (git-fixes).
- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).
- usbnet: smsc95xx: Do not reset PHY behind PHY driver's back (git-fixes).
- v3 of "PCI: hv: Only reuse existing IRTE allocation for Multi-MSI"
- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).
- virtio-blk: Use blk_validate_block_size() to validate block size
(git-fixes).
- vmxnet3: correctly report encapsulated LRO packet (git-fixes).
- vmxnet3: use correct intrConf reference when using extended queues
(git-fixes).
- wifi: airo: do not assign -1 to unsigned char (git-fixes).
- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).
- wifi: ath11k: avoid deadlock during regulatory update in
ath11k_regd_update() (git-fixes).
- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).
- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).
- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).
- wifi: cfg80211: silence a sparse RCU warning (git-fixes).
- wifi: mac80211: Fix ack frame idr leak when mesh has no route
(git-fixes).
- wifi: mac80211: fix memory free error when registering wiphy fail
(git-fixes).
- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support
(git-fixes).
- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration
(git-fixes).
- wifi: wext: use flex array destination for memcpy() (git-fixes).
- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST
attribute (git-fixes).
- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL
attribute (git-fixes).
- wifi: wilc1000: validate number of channels (git-fixes).
- wifi: wilc1000: validate pairwise and authentication suite offsets
(git-fixes).
- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from
S3 (bsc#1206037).
- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).
- x86/entry: Work around Clang __bdos() bug (git-fixes).
- x86/extable: Extend extable functionality (git-fixes).
- x86/fpu: Drop fpregs lock before inheriting FPU permissions
(bnc#1205282).
- x86/futex: Remove .fixup usage (git-fixes).
- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests
(git-fixes).
- x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition (git-fixes).
- x86/hyperv: Update 'struct hv_enlightened_vmcs' definition (git-fixes).
- x86/hyperv: fix invalid writes to MSRs during root partition kexec
(git-fixes).
- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).
- x86/microcode/AMD: Apply the patch early on every logical thread
(bsc#1205264).
- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).
- xen/gntdev: Accommodate VMA splitting (git-fixes).
- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
(git-fixes).
- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).
- xfs: fix perag reference leak on iteration race with growfs (git-fixes).
- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).
- xfs: reserve quota for dir expansion when linking/unlinking files
(bsc#1205616).
- xfs: reserve quota for target dir expansion when renaming files
(bsc#1205679).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-4504=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP4:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4504=1
Package List:
- openSUSE Leap 15.4 (aarch64 x86_64):
cluster-md-kmp-azure-5.14.21-150400.14.28.1
cluster-md-kmp-azure-debuginfo-5.14.21-150400.14.28.1
dlm-kmp-azure-5.14.21-150400.14.28.1
dlm-kmp-azure-debuginfo-5.14.21-150400.14.28.1
gfs2-kmp-azure-5.14.21-150400.14.28.1
gfs2-kmp-azure-debuginfo-5.14.21-150400.14.28.1
kernel-azure-5.14.21-150400.14.28.1
kernel-azure-debuginfo-5.14.21-150400.14.28.1
kernel-azure-debugsource-5.14.21-150400.14.28.1
kernel-azure-devel-5.14.21-150400.14.28.1
kernel-azure-devel-debuginfo-5.14.21-150400.14.28.1
kernel-azure-extra-5.14.21-150400.14.28.1
kernel-azure-extra-debuginfo-5.14.21-150400.14.28.1
kernel-azure-livepatch-devel-5.14.21-150400.14.28.1
kernel-azure-optional-5.14.21-150400.14.28.1
kernel-azure-optional-debuginfo-5.14.21-150400.14.28.1
kernel-syms-azure-5.14.21-150400.14.28.1
kselftests-kmp-azure-5.14.21-150400.14.28.1
kselftests-kmp-azure-debuginfo-5.14.21-150400.14.28.1
ocfs2-kmp-azure-5.14.21-150400.14.28.1
ocfs2-kmp-azure-debuginfo-5.14.21-150400.14.28.1
reiserfs-kmp-azure-5.14.21-150400.14.28.1
reiserfs-kmp-azure-debuginfo-5.14.21-150400.14.28.1
- openSUSE Leap 15.4 (noarch):
kernel-devel-azure-5.14.21-150400.14.28.1
kernel-source-azure-5.14.21-150400.14.28.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP4 (aarch64 x86_64):
kernel-azure-5.14.21-150400.14.28.1
kernel-azure-debuginfo-5.14.21-150400.14.28.1
kernel-azure-debugsource-5.14.21-150400.14.28.1
kernel-azure-devel-5.14.21-150400.14.28.1
kernel-azure-devel-debuginfo-5.14.21-150400.14.28.1
kernel-syms-azure-5.14.21-150400.14.28.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP4 (noarch):
kernel-devel-azure-5.14.21-150400.14.28.1
kernel-source-azure-5.14.21-150400.14.28.1
References:
https://www.suse.com/security/cve/CVE-2022-2602.html
https://www.suse.com/security/cve/CVE-2022-3176.html
https://www.suse.com/security/cve/CVE-2022-3566.html
https://www.suse.com/security/cve/CVE-2022-3567.html
https://www.suse.com/security/cve/CVE-2022-3635.html
https://www.suse.com/security/cve/CVE-2022-3643.html
https://www.suse.com/security/cve/CVE-2022-3707.html
https://www.suse.com/security/cve/CVE-2022-3903.html
https://www.suse.com/security/cve/CVE-2022-4095.html
https://www.suse.com/security/cve/CVE-2022-4129.html
https://www.suse.com/security/cve/CVE-2022-4139.html
https://www.suse.com/security/cve/CVE-2022-41850.html
https://www.suse.com/security/cve/CVE-2022-41858.html
https://www.suse.com/security/cve/CVE-2022-42328.html
https://www.suse.com/security/cve/CVE-2022-42329.html
https://www.suse.com/security/cve/CVE-2022-42895.html
https://www.suse.com/security/cve/CVE-2022-42896.html
https://www.suse.com/security/cve/CVE-2022-4378.html
https://www.suse.com/security/cve/CVE-2022-43945.html
https://www.suse.com/security/cve/CVE-2022-45869.html
https://www.suse.com/security/cve/CVE-2022-45888.html
https://www.suse.com/security/cve/CVE-2022-45934.html
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1156395
https://bugzilla.suse.com/1164051
https://bugzilla.suse.com/1184350
https://bugzilla.suse.com/1189297
https://bugzilla.suse.com/1190256
https://bugzilla.suse.com/1193629
https://bugzilla.suse.com/1194869
https://bugzilla.suse.com/1202341
https://bugzilla.suse.com/1203183
https://bugzilla.suse.com/1204631
https://bugzilla.suse.com/1204636
https://bugzilla.suse.com/1204693
https://bugzilla.suse.com/1204810
https://bugzilla.suse.com/1204850
https://bugzilla.suse.com/1205007
https://bugzilla.suse.com/1205100
https://bugzilla.suse.com/1205111
https://bugzilla.suse.com/1205128
https://bugzilla.suse.com/1205130
https://bugzilla.suse.com/1205149
https://bugzilla.suse.com/1205153
https://bugzilla.suse.com/1205220
https://bugzilla.suse.com/1205331
https://bugzilla.suse.com/1205428
https://bugzilla.suse.com/1205473
https://bugzilla.suse.com/1205514
https://bugzilla.suse.com/1205617
https://bugzilla.suse.com/1205653
https://bugzilla.suse.com/1205744
https://bugzilla.suse.com/1205764
https://bugzilla.suse.com/1205796
https://bugzilla.suse.com/1205882
https://bugzilla.suse.com/1205993
https://bugzilla.suse.com/1206035
https://bugzilla.suse.com/1206036
https://bugzilla.suse.com/1206037
https://bugzilla.suse.com/1206046
https://bugzilla.suse.com/1206047
https://bugzilla.suse.com/1206051
https://bugzilla.suse.com/1206056
https://bugzilla.suse.com/1206057
https://bugzilla.suse.com/1206113
https://bugzilla.suse.com/1206114
https://bugzilla.suse.com/1206147
https://bugzilla.suse.com/1206149
https://bugzilla.suse.com/1206207
https://bugzilla.suse.com/1206273
1
0
SUSE-SU-2022:4503-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 16 Dec '22
by opensuse-security@opensuse.org 16 Dec '22
16 Dec '22
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:4503-1
Rating: important
References: #1065729 #1071995 #1156395 #1184350 #1189297
#1192761 #1200845 #1201455 #1203144 #1203746
#1203960 #1204017 #1204142 #1204215 #1204228
#1204241 #1204328 #1204446 #1204636 #1204693
#1204780 #1204791 #1204810 #1204827 #1204850
#1204868 #1204934 #1204957 #1204963 #1204967
#1205220 #1205264 #1205329 #1205330 #1205428
#1205514 #1205567 #1205617 #1205671 #1205700
#1205705 #1205709 #1205753 #1205984 #1205985
#1205986 #1205987 #1205988 #1205989 #1206207
Cross-References: CVE-2022-2602 CVE-2022-28693 CVE-2022-3567
CVE-2022-3628 CVE-2022-3635 CVE-2022-3707
CVE-2022-3903 CVE-2022-4095 CVE-2022-4129
CVE-2022-4139 CVE-2022-41850 CVE-2022-41858
CVE-2022-42895 CVE-2022-42896 CVE-2022-4378
CVE-2022-43945 CVE-2022-45934
CVSS scores:
CVE-2022-2602 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-28693 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2022-3567 (NVD) : 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3567 (SUSE): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3628 (SUSE): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3635 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3635 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3707 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3903 (NVD) : 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3903 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-4095 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-4129 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-4129 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-4139 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-41850 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-41850 (SUSE): 4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
CVE-2022-41858 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42895 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2022-42895 (SUSE): 6.8 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
CVE-2022-42896 (NVD) : 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42896 (SUSE): 6.8 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2022-4378 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-43945 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-43945 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-45934 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-45934 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Public Cloud 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves 17 vulnerabilities and has 33 fixes
is now available.
Description:
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).
- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file
drivers/atm/idt77252.c of the component IPsec (bsc#1204631).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in
drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in
l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3628: Fixed potential buffer overflow in
brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).
- CVE-2022-3567: Fixed a to race condition in
inet6_stream_ops()/inet6_dgram_ops() of the component IPv6 Handler
(bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in
drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation
(bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver
USB driver (bsc#1205220).
- CVE-2022-2602: Fixed a local privilege escalation vulnerability
involving Unix socket Garbage Collection and io_uring (bsc#1204228).
- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU
to access any physical memory (bsc#1205700).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling
Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a
race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2022-42895: Fixed an information leak in the
net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to
leak kernel pointers remotely (bsc#1205705).
- CVE-2022-42896: Fixed a use-after-free vulnerability in the
net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req()
which may have allowed code execution and leaking kernel memory
(respectively) remotely via Bluetooth (bsc#1205709).
- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver
(bsc#1204780).
The following non-security bugs were fixed:
- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).
- ALSA: hda: fix potential memleak in 'add_widget_node' (git-fixes).
- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).
- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).
- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()
(git-fixes).
- ASoC: codecs: jz4725b: Fix spelling mistake "Sourc" -> "Source",
"Routee" -> "Route" (git-fixes).
- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).
- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).
- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).
- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).
- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).
- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).
- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).
- ASoC: wm5102: Revert "ASoC: wm5102: Fix PM disable depth imbalance in
wm5102_probe" (git-fixes).
- ASoC: wm5110: Revert "ASoC: wm5110: Fix PM disable depth imbalance in
wm5110_probe" (git-fixes).
- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).
- ASoC: wm8997: Revert "ASoC: wm8997: Fix PM disable depth imbalance in
wm8997_probe" (git-fixes).
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory
(git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
(git-fixes).
- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)
- Drivers: hv: vmbus: Add /sys/bus/vmbus/hibernation (git-fixes).
- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).
- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus
hardening (bsc#1204017).
- Drivers: hv: vmbus: Drop error message when 'No request id available'
(bsc#1204017).
- Drivers: hv: vmbus: Fix duplicate CPU assignments within a device
(git-fixes).
- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero
(bsc#1204017).
- Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
(git-fixes).
- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).
- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).
- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).
- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).
- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer
(git-fixes).
- Drivers: hv: vmbus: Remove unused linux/version.h header (git-fixes).
- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb()
(git-fixes).
- Drivers: hv: vmbus: fix double free in the error path of
vmbus_add_channel_work() (git-fixes).
- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
(git-fixes).
- Drivers: hv: vmbus: remove unused function (git-fixes).
- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).
- Input: i8042 - fix leaking of platform device on module removal
(git-fixes).
- Input: iforce - invert valid length check when fetching device IDs
(git-fixes).
- KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support
(git-fixes).
- KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1
(git-fixes).
- KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT)
(git-fixes).
- KVM: nVMX: clear PIN_BASED_POSTED_INTR from nested pinbased_ctls only
when apicv is globally disabled (git-fixes).
- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).
- KVM: s390: Fix handle_sske page fault handling (git-fixes).
- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).
- KVM: s390: get rid of register asm usage (git-fixes).
- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).
- KVM: s390: pv: do not allow userspace to set the clock under PV
(git-fixes).
- KVM: s390: pv: leak the topmost page table when destroy fails
(git-fixes).
- KVM: s390: reduce number of IO pins to 1 (git-fixes).
- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).
- NFS: Refactor nfs_instantiate() for dentry referencing callers
(bsc#1204215).
- NFSv3: use nfs_add_or_obtain() to create and reference inodes
(bsc#1204215).
- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv()
(bsc#1204446).
- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).
- PCI: hv: Drop msi_controller structure (bsc#1204446).
- PCI: hv: Fix a race condition when removing the device (bsc#1204446).
- PCI: hv: Fix sleep while in non-sleep context when removing child
devices from the bus (bsc#1204446).
- PCI: hv: Fix synchronization between channel callback and
hv_compose_msi_msg() (bsc#1204017).
- PCI: hv: Fix synchronization between channel callback and
hv_pci_bus_exit() (bsc#1204017).
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg()
(bsc#1200845).
- PCI: hv: Fix typo (bsc#1204446).
- PCI: hv: Remove bus device removal unused refcount/functions
(bsc#1204446).
- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).
- PCI: hv: Support for create interrupt v3 (bsc#1204446).
- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors
(bsc#1204446).
- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus
hardening (bsc#1204017).
- RDMA/core/sa_query: Remove unused argument (git-fixes)
- RDMA/hns: Fix spelling mistakes of original (git-fixes)
- RDMA/qedr: Add support for user mode XRC-SRQ's (git-fixes)
- RDMA/qedr: Fix reporting max_{send/recv}_wr attrs (git-fixes)
- RDMA/qedr: Remove unsupported qedr_resize_cq callback (git-fixes)
- RDMA/rxe: Fix memory leak in error path code (git-fixes)
- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).
- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).
- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).
- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
- USB: serial: option: remove old LARA-R6 PID (git-fixes).
- USB: serial: option: remove old LARA-R6 PID.
- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).
- add another bug reference to some hyperv changes (bsc#1205617).
- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).
- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes)
- arm64: dts: juno: Add thermal critical trip points (git-fixes)
- ata: libata-transport: fix double ata_host_put() in ata_tport_add()
(git-fixes).
- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).
- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).
- blk-crypto: fix check for too-large dun_bytes (git-fixes).
- blk-mq: Properly init requests from blk_mq_alloc_request_hctx()
(git-fixes).
- blk-mq: do not create hctx debugfs dir until q->debugfs_dir is created
(git-fixes).
- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).
- blktrace: Trace remapped requests correctly (git-fixes).
- block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern
(git-fixes).
- block: Add a helper to validate the block size (git-fixes).
- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1204328).
- block: ataflop: fix breakage introduced at blk-mq refactoring
(git-fixes).
- block: ataflop: more blk-mq refactoring fixes (git-fixes).
- block: fix infinite loop for invalid zone append (git-fixes).
- block: limit request dispatch loop duration (git-fixes).
- block: nbd: add sanity check for first_minor (git-fixes).
- block: use "unsigned long" for blk_validate_block_size() (git-fixes).
- bus: sunxi-rsb: Support atomic transfers (git-fixes).
- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).
- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev()
(git-fixes).
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
(git-fixes).
- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1205989).
- ceph: do not access the kiocb after aio requests (bsc#1205984).
- ceph: fix fscache invalidation (bsc#1205985).
- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205988).
- ceph: remove bogus checks and WARN_ONs from ceph_set_page_dirty
(bsc#1205986).
- ceph: request Fw caps before updating the mtime in ceph_write_iter
(bsc#1205987).
- cifs: skip extra NULL byte in filenames (bsc#1204791).
- dm era: commit metadata in postsuspend after worker stops (git-fixes).
- dm integrity: set journal entry unused when shrinking device (git-fixes).
- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).
- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).
- dm raid: fix accesses beyond end of raid member array (git-fixes).
- dm raid: fix address sanitizer warning in raid_resume (git-fixes).
- dm raid: fix address sanitizer warning in raid_status (git-fixes).
- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback
(git-fixes).
- dm verity fec: fix misaligned RS roots IO (git-fixes).
- dm writecache: fix writing beyond end of underlying device when
shrinking (git-fixes).
- dm writecache: return the exact table values that were set (git-fixes).
- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).
- dm: fix request-based DM to not bounce through indirect dm_submit_bio
(git-fixes).
- dm: remove special-casing of bio-based immutable singleton target on
NVMe (git-fixes).
- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).
- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).
- dmaengine: at_hdmac: Check return code of dma_async_device_register
(git-fixes).
- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable
(git-fixes).
- dmaengine: at_hdmac: Do not start transactions at tx_submit level
(git-fixes).
- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).
- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of
errors (git-fixes).
- dmaengine: at_hdmac: Fix impossible condition (git-fixes).
- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove()
(git-fixes).
- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).
- drivers/hv: remove obsolete TODO and fix misleading typo in comment
(git-fixes).
- drivers: hv: Fix EXPORT_SYMBOL and tab spaces issue (git-fixes).
- drivers: hv: Fix hyperv_record_panic_msg path on comment (git-fixes).
- drivers: hv: Fix missing error code in vmbus_connect() (git-fixes).
- drivers: hv: vmbus: Fix call msleep using < 20ms (git-fixes).
- drivers: hv: vmbus: Fix checkpatch LINE_SPACING (git-fixes).
- drivers: hv: vmbus: Fix checkpatch SPLIT_STRING (git-fixes).
- drivers: hv: vmbus: Replace symbolic permissions by octal permissions
(git-fixes).
- drivers: net: slip: fix NPD bug in sl_tx_timeout() (git-fixes).
- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).
- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).
- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).
- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).
- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid
(git-fixes).
- drm/panel: simple: set bpc field for logic technologies displays
(git-fixes).
- drm/rockchip: dsi: Force synchronous probe (git-fixes).
- drm/vc4: Fix missing platform_unregister_drivers() call in
vc4_drm_register() (git-fixes).
- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()
(git-fixes).
- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).
- firmware: arm_scmi: Suppress the driver's bind attributes (git-fixes).
- ftrace: Fix char print issue in print_ip_ins() (git-fixes).
- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).
- ftrace: Fix the possible incorrect kernel message (git-fixes).
- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).
- ftrace: Optimize the allocation for mcount entries (git-fixes).
- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).
- fuse: add file_modified() to fallocate (bsc#1205330).
- fuse: fix readdir cache race (bsc#1205329).
- hamradio: fix issue of dev reference count leakage in bpq_device_event()
(git-fixes).
- hv: hyperv.h: Remove unused inline functions (git-fixes).
- hv_netvsc: Add a comment clarifying batching logic (git-fixes).
- hv_netvsc: Add check for kvmalloc_array (git-fixes).
- hv_netvsc: Add error handling while switching data path (bsc#1204850).
- hv_netvsc: Allocate the recv_buf buffers after
NVSP_MSG1_TYPE_SEND_RECV_BUF (git-fixes).
- hv_netvsc: Check VF datapath when sending traffic to VF (git-fixes).
- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).
- hv_netvsc: Fix race between VF offering and VF association message from
host (bsc#1204850).
- hv_netvsc: Print value of invalid ID in
netvsc_send_{completion,tx_complete}() (git-fixes).
- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).
- hv_netvsc: Use bitmap_zalloc() when applicable (git-fixes).
- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus
hardening (bsc#1204017).
- hv_netvsc: Validate number of allocated sub-channels (git-fixes).
- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).
- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).
- hv_utils: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).
- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()
(git-fixes).
- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).
- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails
(git-fixes).
- i2c: i801: add lis3lv02d's I2C address for Vostro 5568 (git-fixes).
- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).
- iio: adc: at91_adc: fix possible memory leak in
at91_adc_allocate_trigger() (git-fixes).
- iio: core: Fix entry not deleted when iio_register_sw_trigger_type()
fails (git-fixes).
- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).
- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw
(git-fixes).
- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).
- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).
- iio: pressure: ms5611: changed hardcoded SPI speed to value limited
(git-fixes).
- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init()
(git-fixes).
- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).
- iwlwifi: dbg: disable ini debug in 9000 family and below (git-fixes).
- kABI: Fix after adding trace_iterator.wait_index (git-fixes).
- kABI: remove new member of usbip_device (git-fixes).
- kabi: fix transport_add_device change (git-fixes).
- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).
- kvm: nVMX: reflect MTF VM-exits if injected by L1 (git-fixes).
- loop: Check for overflow while configuring loop (git-fixes).
- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).
- mISDN: fix possible memory leak in mISDN_dsp_element_register()
(git-fixes).
- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).
- md/raid5: Ensure stripe_fill happens on non-read IO with journal
(git-fixes).
- md: Replace snprintf with scnprintf (git-fixes).
- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).
- media: meson: vdec: fix possible refcount leak in vdec_probe()
(git-fixes).
- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation
(git-fixes).
- media: venus: dec: Handle the case where find_format fails (git-fixes).
- media: vim2m: initialize the media device earlier (git-fixes).
- media: vivid: fix assignment of dev->fbuf_out_flags (git-fixes).
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
(git-fixes).
- mmc: core: properly select voltage range without power cycle (git-fixes).
- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI
(git-fixes).
- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD#
debounce timeout (git-fixes).
- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put()
(git-fixes).
- nbd: Fix use-after-free in pid_show (git-fixes).
- nbd: fix possible overflow for 'first_minor' in nbd_dev_add()
(git-fixes).
- nbd: fix possible overflow on 'first_minor' in nbd_dev_add() (git-fixes).
- nbd: handle device refs for DESTROY_ON_DISCONNECT properly (git-fixes).
- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).
- net: ethernet: nixge: fix NULL dereference (git-fixes).
- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed
(git-fixes).
- net: hyperv: remove use of bpf_op_t (git-fixes).
- net: netvsc: remove break after return (git-fixes).
- net: phy: fix null-ptr-deref while probe() failed (git-fixes).
- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for MR400 (git-fixes).
- net: usb: qmi_wwan: restore mtu min/max values after raw_ip switch
(git-fixes).
- nfc/nci: fix race with opening and closing (git-fixes).
- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()
(git-fixes).
- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send()
(git-fixes).
- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION
(git-fixes).
- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).
- nfsd: set the server_scope during service startup (bsc#1203746).
- null_blk: Fail zone append to conventional zones (git-fixes).
- null_blk: synchronization fix for zoned device (git-fixes).
- nvmem: core: Check input parameter for NULL in nvmem_unregister()
(bsc#1204241).
- panic, kexec: make __crash_kexec() NMI safe (git-fixes).
- parport_pc: Avoid FIFO port location truncation (git-fixes).
- phy: stm32: fix an error code in probe (git-fixes).
- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map
(git-fixes).
- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).
- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).
- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).
- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).
- printk: use atomic updates for klogd work (bsc#1204934).
- printk: wake waiters for safe and NMI contexts (bsc#1204934).
- r8152: Add MAC passthrough support to new device (git-fixes).
- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).
- r8152: use new helper tcp_v6_gso_csum_prep (git-fixes).
- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).
- regulator: core: fix UAF in destroy_regulator() (git-fixes).
- regulator: core: fix kobject release warning and memory leak in
regulator_register() (git-fixes).
- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).
- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Allow splice to read previous partially read pages
(git-fixes).
- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters()
(git-fixes).
- ring-buffer: Check pending waiters when doing wake ups as well
(git-fixes).
- ring-buffer: Fix race between reset page and reading page (git-fixes).
- ring-buffer: Have the shortest_full queue be the shortest not longest
(git-fixes).
- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).
- ring_buffer: Do not deactivate non-existant pages (git-fixes).
- rndis_host: increase sleep time in the query-response loop (git-fixes).
- rtc: mt6397: fix alarm register overwrite (git-fixes).
- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).
- s390/cpcmd: fix inline assembly register clobbering (git-fixes).
- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup
(git-fixes).
- s390/disassembler: increase ebpf disasm buffer size (git-fixes).
- s390/futex: add missing EX_TABLE entry to __futex_atomic_op()
(bsc#1205428 LTC#200501).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages
(bsc#1203144 LTC#199881).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest
(git-fixes).
- s390/pci: add missing EX_TABLE entries to
__pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).
- s390/ptrace: return -ENOSYS when invalid syscall is supplied (git-fixes).
- s390/uaccess: add missing EX_TABLE entries to __clear_user(),
copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and
__strnlen_user() (bsc#1205428 LTC#200501).
- s390/vtime: fix inline assembly clobber list (git-fixes).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- s390/zcrypt: fix zcard and zqueue hot-unplug memleak (git-fixes).
- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).
- s390: fix double free of GS and RI CBs on fork() failure (git-fixes).
- s390: fix nospec table alignments (git-fixes).
- s390: mark __cpacf_query() as __always_inline (git-fixes).
- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).
- scsi: drivers: base: Propagate errors through the transport component
(git-fixes).
- scsi: drivers: base: Support atomic version of
attribute_container_device_trigger (git-fixes).
- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729
bsc#1204810 ltc#200162).
- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).
- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver
info (bsc#1204957).
- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs
(bsc#1204957).
- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).
- scsi: lpfc: Fix spelling mistake "unsolicted" -> "unsolicited"
(bsc#1204957).
- scsi: lpfc: Log when congestion management limits are in effect
(bsc#1204957).
- scsi: lpfc: Set sli4_param's cmf option to zero when CMF is turned off
(bsc#1204957).
- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).
- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).
- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).
- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds
(bsc#1204963).
- scsi: scsi_transport_sas: Fix error handling in sas_phy_add()
(git-fixes).
- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).
- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).
- scsi: storvsc: Fix handling of srb_status and capacity change events
(git-fixes).
- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer
(bsc#1204017).
- scsi: storvsc: Fix validation for unsolicited incoming packets
(bsc#1204017).
- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).
- scsi: storvsc: Miscellaneous code cleanups (git-fixes).
- scsi: storvsc: Parameterize number hardware queues (git-fixes).
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).
- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).
- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).
- scsi: storvsc: Update error logging (git-fixes).
- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs
(bsc#1204017).
- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request
(git-fixes).
- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus
hardening (bsc#1204017).
- scsi: storvsc: Validate length of incoming packet in
storvsc_on_channel_callback() (bsc#1204017).
- scsi: zfcp: Fix double free of FSF request when qdio send fails
(git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports
(git-fixes).
- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).
- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in
omap8250_remove() (git-fixes).
- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).
- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).
- serial: 8250_omap: remove wait loop from Errata i202 workaround
(git-fixes).
- serial: imx: Add missing .thaw_noirq hook (git-fixes).
- siox: fix possible memory leak in siox_device_add() (git-fixes).
- slimbus: stream: correct presence rate frequencies (git-fixes).
- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input
clock (git-fixes).
- spi: stm32: Print summary 'callbacks suppressed' message (git-fixes).
- staging: greybus: light: fix a couple double frees (git-fixes).
- swiotlb-xen: use vmalloc_to_page on vmalloc virt addresses (git-fixes).
- tracing/ring-buffer: Have polling block on watermark (git-fixes).
- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).
- tracing: Disable interrupt or preemption before acquiring
arch_spinlock_t (git-fixes).
- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).
- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).
- tracing: Simplify conditional compilation code in tracing_set_tracer()
(git-fixes).
- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).
- tracing: Wake up waiters when tracing is disabled (git-fixes).
- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: fix PHY disable sequence (git-fixes).
- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).
- usb: dwc3: gadget: Fix null pointer exception (git-fixes).
- usb: dwc3: qcom: fix runtime PM wakeup.
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96
controller (git-fixes).
- usbip: add sysfs_lock to synchronize sysfs code paths (git-fixes).
- usbip: stub-dev synchronize sysfs code paths (git-fixes).
- usbip: stub_dev: remake locking for kABI (git-fixes).
- usbip: synchronize event handler with sysfs code paths (git-fixes).
- usbip: usbip_event: use global lock (git-fixes).
- usbip: vudc synchronize sysfs code paths (git-fixes).
- usbip: vudc_sysfs: use global lock (git-fixes).
- use __netdev_notify_peers in hyperv (git-fixes).
- v3 of "PCI: hv: Only reuse existing IRTE allocation for Multi-MSI"
- v3 of "PCI: hv: Only reuse existing IRTE allocation for Multi-MSI"
(bsc#1200845)
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero
(git-fixes).
- virtio-blk: Use blk_validate_block_size() to validate block size
(git-fixes).
- virtio_blk: eliminate anonymous module_init & module_exit (git-fixes).
- virtio_blk: fix the discard_granularity and discard_alignment queue
limits (git-fixes).
- vmlinux.lds.h: Fix placement of '.data..decrypted' section (git-fixes).
- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).
- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).
- wifi: cfg80211: silence a sparse RCU warning (git-fixes).
- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration
(git-fixes).
- workqueue: do not skip lockdep work dependency in cancel_work_sync()
(bsc#1204967).
- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).
- x86/hyperv: Output host build info as normal Windows version number
(git-fixes).
- x86/hyperv: check cpu mask after interrupt has been disabled (git-fixes).
- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).
- x86/microcode/AMD: Apply the patch early on every logical thread
(bsc#1205264).
- x86/xen: Add xen_no_vector_callback option to test PCI INTX delivery
(git-fixes).
- x86/xen: Distribute switch variables for initialization (git-fixes).
- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).
- xen-blkback: prevent premature module unload (git-fixes).
- xen-netback: correct success/error reporting for the SKB-with-fraglist
case (git-fixes).
- xen/balloon: fix balloon kthread freezing (git-fixes).
- xen/balloon: fix ballooned page accounting without hotplug enabled
(git-fixes).
- xen/balloon: fix cancelled balloon action (git-fixes).
- xen/balloon: use a kernel thread instead a workqueue (git-fixes).
- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).
- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).
- xen/gntdev: Prevent leaking grants (git-fixes).
- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).
- xen/privcmd: Corrected error handling path (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/xenbus: Fix granting of vmalloc'd memory (git-fixes).
- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status
(git-fixes).
- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).
- xen: Fix event channel callback via INTX/GSI (git-fixes).
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
(git-fixes).
- xenbus: req->body should be updated before req->state (git-fixes).
- xenbus: req->err should be updated before req->state (git-fixes).
- xfs: Lower CIL flush limit for large logs (git-fixes).
- xfs: Throttle commits on delayed background CIL push (git-fixes).
- xfs: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- xfs: check owner of dir3 blocks (git-fixes).
- xfs: factor common AIL item deletion code (git-fixes).
- xfs: open code insert range extent split helper (git-fixes).
- xfs: rework collapse range into an atomic operation (git-fixes).
- xfs: rework insert range into an atomic operation (git-fixes).
- xfs: tail updates only need to occur when LSN changes (git-fixes).
- xfs: trylock underlying buffer on dquot flush (git-fixes).
- xfs: xfs_buf_corruption_error should take __this_address (git-fixes).
- xhci: Remove device endpoints from bandwidth list when freeing the
device (git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-4503=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4503=1
Package List:
- openSUSE Leap 15.3 (x86_64):
cluster-md-kmp-azure-5.3.18-150300.38.88.1
cluster-md-kmp-azure-debuginfo-5.3.18-150300.38.88.1
dlm-kmp-azure-5.3.18-150300.38.88.1
dlm-kmp-azure-debuginfo-5.3.18-150300.38.88.1
gfs2-kmp-azure-5.3.18-150300.38.88.1
gfs2-kmp-azure-debuginfo-5.3.18-150300.38.88.1
kernel-azure-5.3.18-150300.38.88.1
kernel-azure-debuginfo-5.3.18-150300.38.88.1
kernel-azure-debugsource-5.3.18-150300.38.88.1
kernel-azure-devel-5.3.18-150300.38.88.1
kernel-azure-devel-debuginfo-5.3.18-150300.38.88.1
kernel-azure-extra-5.3.18-150300.38.88.1
kernel-azure-extra-debuginfo-5.3.18-150300.38.88.1
kernel-azure-livepatch-devel-5.3.18-150300.38.88.1
kernel-azure-optional-5.3.18-150300.38.88.1
kernel-azure-optional-debuginfo-5.3.18-150300.38.88.1
kernel-syms-azure-5.3.18-150300.38.88.1
kselftests-kmp-azure-5.3.18-150300.38.88.1
kselftests-kmp-azure-debuginfo-5.3.18-150300.38.88.1
ocfs2-kmp-azure-5.3.18-150300.38.88.1
ocfs2-kmp-azure-debuginfo-5.3.18-150300.38.88.1
reiserfs-kmp-azure-5.3.18-150300.38.88.1
reiserfs-kmp-azure-debuginfo-5.3.18-150300.38.88.1
- openSUSE Leap 15.3 (noarch):
kernel-devel-azure-5.3.18-150300.38.88.1
kernel-source-azure-5.3.18-150300.38.88.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3 (x86_64):
kernel-azure-5.3.18-150300.38.88.1
kernel-azure-debuginfo-5.3.18-150300.38.88.1
kernel-azure-debugsource-5.3.18-150300.38.88.1
kernel-azure-devel-5.3.18-150300.38.88.1
kernel-azure-devel-debuginfo-5.3.18-150300.38.88.1
kernel-syms-azure-5.3.18-150300.38.88.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3 (noarch):
kernel-devel-azure-5.3.18-150300.38.88.1
kernel-source-azure-5.3.18-150300.38.88.1
References:
https://www.suse.com/security/cve/CVE-2022-2602.html
https://www.suse.com/security/cve/CVE-2022-28693.html
https://www.suse.com/security/cve/CVE-2022-3567.html
https://www.suse.com/security/cve/CVE-2022-3628.html
https://www.suse.com/security/cve/CVE-2022-3635.html
https://www.suse.com/security/cve/CVE-2022-3707.html
https://www.suse.com/security/cve/CVE-2022-3903.html
https://www.suse.com/security/cve/CVE-2022-4095.html
https://www.suse.com/security/cve/CVE-2022-4129.html
https://www.suse.com/security/cve/CVE-2022-4139.html
https://www.suse.com/security/cve/CVE-2022-41850.html
https://www.suse.com/security/cve/CVE-2022-41858.html
https://www.suse.com/security/cve/CVE-2022-42895.html
https://www.suse.com/security/cve/CVE-2022-42896.html
https://www.suse.com/security/cve/CVE-2022-4378.html
https://www.suse.com/security/cve/CVE-2022-43945.html
https://www.suse.com/security/cve/CVE-2022-45934.html
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1156395
https://bugzilla.suse.com/1184350
https://bugzilla.suse.com/1189297
https://bugzilla.suse.com/1192761
https://bugzilla.suse.com/1200845
https://bugzilla.suse.com/1201455
https://bugzilla.suse.com/1203144
https://bugzilla.suse.com/1203746
https://bugzilla.suse.com/1203960
https://bugzilla.suse.com/1204017
https://bugzilla.suse.com/1204142
https://bugzilla.suse.com/1204215
https://bugzilla.suse.com/1204228
https://bugzilla.suse.com/1204241
https://bugzilla.suse.com/1204328
https://bugzilla.suse.com/1204446
https://bugzilla.suse.com/1204636
https://bugzilla.suse.com/1204693
https://bugzilla.suse.com/1204780
https://bugzilla.suse.com/1204791
https://bugzilla.suse.com/1204810
https://bugzilla.suse.com/1204827
https://bugzilla.suse.com/1204850
https://bugzilla.suse.com/1204868
https://bugzilla.suse.com/1204934
https://bugzilla.suse.com/1204957
https://bugzilla.suse.com/1204963
https://bugzilla.suse.com/1204967
https://bugzilla.suse.com/1205220
https://bugzilla.suse.com/1205264
https://bugzilla.suse.com/1205329
https://bugzilla.suse.com/1205330
https://bugzilla.suse.com/1205428
https://bugzilla.suse.com/1205514
https://bugzilla.suse.com/1205567
https://bugzilla.suse.com/1205617
https://bugzilla.suse.com/1205671
https://bugzilla.suse.com/1205700
https://bugzilla.suse.com/1205705
https://bugzilla.suse.com/1205709
https://bugzilla.suse.com/1205753
https://bugzilla.suse.com/1205984
https://bugzilla.suse.com/1205985
https://bugzilla.suse.com/1205986
https://bugzilla.suse.com/1205987
https://bugzilla.suse.com/1205988
https://bugzilla.suse.com/1205989
https://bugzilla.suse.com/1206207
1
0
16 Dec '22
SUSE Recommended Update: Recommended update for rekor
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:4502-1
Rating: moderate
References: SLE-23476
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has 0 recommended fixes and contains one
feature can now be installed.
Description:
This update for rekor fixes the following issues:
Rekor was updated to 1.0.1 (jsc#SLE-23476):
- stop inserting envelope hash for intoto:0.0.2 types into index
- build with FIPSified go1.18.
updated to rekor 1.0.0 (jsc#SLE-23476):
- add description on /api/v1/index/retrieve endpoint
- Adding e2e test coverage
- export rekor build/version information
- Use POST instead of GET for /api/log/entries/retrieve metrics.
- Search through all shards when searching
- verify: verify checkpoint's STH against the inclusion proof root hash
- add ability to enable/disable specific rekor API endpoints
- enable configurable client retries with backoff in RekorClient
- remove dead code around api-key and timestamp references
- update swagger API version to 1.0.0
- remove unused RekorVersion API definition
- install gocovmerge in hack/tools
- add retry command line flag on rekor-cli
- Add some info and debug logging to commonly used funcs
updated to rekor 0.12.2 (jsc#SLE-23476):
- add description on /api/v1/index/retrieve endpoint
- Adding e2e test coverage
- export rekor build/version information
- Use POST instead of GET for /api/log/entries/retrieve metrics.
- Search through all shards when searching by hash
updated to rekor 0.12.1 (jsc#SLE-23476):
- ** Rekor ** v0.12.1 comes with a breaking change to rekor-cli v0.12.1.
Users of rekor-cli MUST upgrade to the latest version The addition of
the intotov2 created a breaking change for the rekor-cli
- What's Changed
- fix: fix harness tests with intoto v0.0.2
- feat: add file based signer and password
- Adds new rekor metrics for latency and QPS.
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-4502=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-4502=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
rekor-1.0.1-150400.4.6.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
rekor-1.0.1-150400.4.6.1
References:
1
0
openSUSE-SU-2022:10244-1: important: Security update for chromium
by opensuse-security@opensuse.org 15 Dec '22
by opensuse-security@opensuse.org 15 Dec '22
15 Dec '22
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10244-1
Rating: important
References: #1205433
Cross-References: CVE-2022-4436 CVE-2022-4437 CVE-2022-4438
CVE-2022-4439 CVE-2022-4440
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Update to version 108.0.5359.124 (boo#1206403):
- CVE-2022-4436: Use after free in Blink Media
- CVE-2022-4437: Use after free in Mojo IPC
- CVE-2022-4438: Use after free in Blink Frames
- CVE-2022-4439: Use after free in Aura
- CVE-2022-4440: Use after free in Profiles
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2022-10244=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 x86_64):
chromedriver-108.0.5359.124-bp154.2.55.1
chromium-108.0.5359.124-bp154.2.55.1
References:
https://www.suse.com/security/cve/CVE-2022-4436.html
https://www.suse.com/security/cve/CVE-2022-4437.html
https://www.suse.com/security/cve/CVE-2022-4438.html
https://www.suse.com/security/cve/CVE-2022-4439.html
https://www.suse.com/security/cve/CVE-2022-4440.html
https://bugzilla.suse.com/1205433
1
0
SUSE-RU-2022:4498-1: moderate: Recommended update for yast2-cluster
by maintenance@opensuse.org 15 Dec '22
by maintenance@opensuse.org 15 Dec '22
15 Dec '22
SUSE Recommended Update: Recommended update for yast2-cluster
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:4498-1
Rating: moderate
References: #1204530
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Availability 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for yast2-cluster fixes the following issues:
- Set crypto_hash as "sha1" and set crypto_cipher as "aes256" (bsc#1204530)
- Set transport as "udpu" when detect in cloud
- Set default values for mcastaddr/mcastport/bindnedaddr when cluster
firstly configured
- Set focus on "Generate Auth Key File" when secauth is true
- Implement ValidateSecurity method
- Set focus on 'memberaddr add' when using udpu
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-4498=1
- SUSE Linux Enterprise High Availability 15-SP3:
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2022-4498=1
Package List:
- openSUSE Leap 15.3 (noarch):
yast2-cluster-4.3.7-150300.3.3.1
- SUSE Linux Enterprise High Availability 15-SP3 (noarch):
yast2-cluster-4.3.7-150300.3.3.1
References:
https://bugzilla.suse.com/1204530
1
0
15 Dec '22
SUSE Recommended Update: Recommended update for lsvpd
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:4494-1
Rating: important
References: #1187665 PED-534 SLE-24497 SLE-25107
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that has one recommended fix and contains three
features can now be installed.
Description:
This update for lsvpd fixes the following issues:
Version update from 1.7.13 to 1.7.14 (jsc#SLE-25107, jsc#SLE-24497):
- Prevent corruption of database file when running vpdupdate (bsc#1187665)
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-4494=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4494=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4494=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4494=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-4494=1
Package List:
- openSUSE Leap 15.3 (ppc64le):
lsvpd-1.7.14-150200.3.15.2
lsvpd-debuginfo-1.7.14-150200.3.15.2
lsvpd-debugsource-1.7.14-150200.3.15.2
- SUSE Manager Server 4.1 (ppc64le):
lsvpd-1.7.14-150200.3.15.2
lsvpd-debuginfo-1.7.14-150200.3.15.2
lsvpd-debugsource-1.7.14-150200.3.15.2
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le):
lsvpd-1.7.14-150200.3.15.2
lsvpd-debuginfo-1.7.14-150200.3.15.2
lsvpd-debugsource-1.7.14-150200.3.15.2
- SUSE Linux Enterprise Server 15-SP2-LTSS (ppc64le):
lsvpd-1.7.14-150200.3.15.2
lsvpd-debuginfo-1.7.14-150200.3.15.2
lsvpd-debugsource-1.7.14-150200.3.15.2
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (ppc64le):
lsvpd-1.7.14-150200.3.15.2
lsvpd-debuginfo-1.7.14-150200.3.15.2
lsvpd-debugsource-1.7.14-150200.3.15.2
References:
https://bugzilla.suse.com/1187665
1
0
15 Dec '22
SUSE Feature Update: Feature update for lsvpd
______________________________________________________________________________
Announcement ID: SUSE-FU-2022:4495-1
Rating: important
References: #1187665 PED-534 SLE-24497 SLE-25107
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one feature fix and contains three
features can now be installed.
Description:
This update for lsvpd fixes the following issues:
Version update from 1.7.13 to 1.7.14 (jsc#SLE-25107, jsc#SLE-24497,
jsc#PED-534):
- Prevent corruption of database file when running vpdupdate (bsc#1187665)
Patch Instructions:
To install this SUSE Feature Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-4495=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-4495=1
Package List:
- openSUSE Leap 15.4 (ppc64le):
lsvpd-1.7.14-150400.3.4.2
lsvpd-debuginfo-1.7.14-150400.3.4.2
lsvpd-debugsource-1.7.14-150400.3.4.2
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (ppc64le):
lsvpd-1.7.14-150400.3.4.2
lsvpd-debuginfo-1.7.14-150400.3.4.2
lsvpd-debugsource-1.7.14-150400.3.4.2
References:
https://bugzilla.suse.com/1187665
1
0
SUSE-SU-2022:4501-1: important: Security update for ceph
by opensuse-security@opensuse.org 15 Dec '22
by opensuse-security@opensuse.org 15 Dec '22
15 Dec '22
SUSE Security Update: Security update for ceph
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:4501-1
Rating: important
References: #1178073 #1194131 #1194353 #1194875 #1195359
#1196044 #1196785 #1196938 #1200064 #1200553
SES-2515 SLE-24710 SLE-24711
Cross-References: CVE-2021-3979
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap Micro 5.2
______________________________________________________________________________
An update that solves one vulnerability, contains three
features and has 9 fixes is now available.
Description:
This update for ceph fixes the following issues:
ceph was updated to the Pacific release (16.2.9-536-g41a9f9a5573):
+ (bsc#1195359, bsc#1200553) rgw: check bucket shard init status in
RGWRadosBILogTrimCR
+ (bsc#1194131) ceph-volume: honour osd_dmcrypt_key_size option
(CVE-2021-3979)
+ (bsc#1200064,) Remove last vestiges of docker.io image paths
+ (bsc#1196044) cephadm: prometheus: The generatorURL in alerts is only
using hostname
+ (bsc#1196785) cephadm: avoid crashing on expected non-zero exit
+ (jsc#SES-2515) High-availability NFS export
+ (bsc#1194875) [SES7P] include/buffer: include <memory>
+ cephadm: update image paths to registry.suse.com
+ cephadm: use snmp-notifier image from registry.suse.de
+ cephadm: infer the default container image during pull
+ mgr/cephadm: try to get FQDN for inventory address
+ (bsc#1194875) common: fix FTBFS due to dout & need_dynamic on GCC-12
+ (bsc#1196938) cephadm: preserve authorized_keys file during upgrade
+ Update Prometheus Container image paths (pr #459)
+ mgr/dashboard: Fix documentation URL (pr #456)
+ mgr/dashboard: Adapt downstream branded navigation page (pr #454)
+ Update prometheus-server version
+ (bsc#1194353) Downstream branding breaks dashboard npm build
+ (bsc#1178073) mgr/dashboard: fix downstream NFS doc links
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.2:
zypper in -t patch openSUSE-Leap-Micro-5.2-2022-4501=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-4501=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-4501=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-4501=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-4501=1
Package List:
- openSUSE Leap Micro 5.2 (aarch64 x86_64):
ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.6.3.1
libfmt8-8.0.1-150300.7.5.1
libfmt8-debuginfo-8.0.1-150300.7.5.1
librados2-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
ceph-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-base-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-base-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-common-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-common-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-fuse-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-fuse-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-immutable-object-cache-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-immutable-object-cache-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mds-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mds-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mgr-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mgr-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mon-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mon-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-osd-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-osd-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-radosgw-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-radosgw-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
cephfs-shell-16.2.9.536+g41a9f9a5573-150300.6.3.1
libcephfs-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
libcephfs2-16.2.9.536+g41a9f9a5573-150300.6.3.1
libcephfs2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
libfmt8-8.0.1-150300.7.5.1
libfmt8-debuginfo-8.0.1-150300.7.5.1
librados-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados-devel-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados2-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
libradospp-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
librgw-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
librgw2-16.2.9.536+g41a9f9a5573-150300.6.3.1
librgw2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-ceph-argparse-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-ceph-common-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-cephfs-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-cephfs-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rados-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rados-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rbd-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rgw-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rgw-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
rados-objclass-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
rbd-fuse-16.2.9.536+g41a9f9a5573-150300.6.3.1
rbd-fuse-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
rbd-mirror-16.2.9.536+g41a9f9a5573-150300.6.3.1
rbd-mirror-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
rbd-nbd-16.2.9.536+g41a9f9a5573-150300.6.3.1
rbd-nbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
- openSUSE Leap 15.3 (noarch):
ceph-grafana-dashboards-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mgr-cephadm-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mgr-dashboard-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mgr-diskprediction-local-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mgr-k8sevents-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mgr-modules-core-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-mgr-rook-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-prometheus-alerts-16.2.9.536+g41a9f9a5573-150300.6.3.1
cephadm-16.2.9.536+g41a9f9a5573-150300.6.3.1
- openSUSE Leap 15.3 (x86_64):
ceph-test-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-test-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-test-debugsource-16.2.9.536+g41a9f9a5573-150300.6.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
ceph-common-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-common-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.6.3.1
fmt-debugsource-8.0.1-150300.7.5.1
libcephfs-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
libcephfs2-16.2.9.536+g41a9f9a5573-150300.6.3.1
libcephfs2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
libfmt8-8.0.1-150300.7.5.1
libfmt8-debuginfo-8.0.1-150300.7.5.1
librados-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados-devel-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados2-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
libradospp-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
librgw-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
librgw2-16.2.9.536+g41a9f9a5573-150300.6.3.1
librgw2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-ceph-argparse-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-ceph-common-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-cephfs-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-cephfs-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rados-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rados-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rbd-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rgw-16.2.9.536+g41a9f9a5573-150300.6.3.1
python3-rgw-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
rados-objclass-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1
rbd-nbd-16.2.9.536+g41a9f9a5573-150300.6.3.1
rbd-nbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64):
ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.6.3.1
libfmt8-8.0.1-150300.7.5.1
libfmt8-debuginfo-8.0.1-150300.7.5.1
librados2-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 x86_64):
ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.6.3.1
libfmt8-8.0.1-150300.7.5.1
libfmt8-debuginfo-8.0.1-150300.7.5.1
librados2-16.2.9.536+g41a9f9a5573-150300.6.3.1
librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-16.2.9.536+g41a9f9a5573-150300.6.3.1
librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.6.3.1
References:
https://www.suse.com/security/cve/CVE-2021-3979.html
https://bugzilla.suse.com/1178073
https://bugzilla.suse.com/1194131
https://bugzilla.suse.com/1194353
https://bugzilla.suse.com/1194875
https://bugzilla.suse.com/1195359
https://bugzilla.suse.com/1196044
https://bugzilla.suse.com/1196785
https://bugzilla.suse.com/1196938
https://bugzilla.suse.com/1200064
https://bugzilla.suse.com/1200553
1
0
SUSE-FU-2022:4496-1: moderate: Feature update for SCA patterns
by maintenance@opensuse.org 15 Dec '22
by maintenance@opensuse.org 15 Dec '22
15 Dec '22
SUSE Feature Update: Feature update for SCA patterns
______________________________________________________________________________
Announcement ID: SUSE-FU-2022:4496-1
Rating: moderate
References: #1045605 #1124793 #1131489 #1138452 #1144162
#1152800 #1154768 #1154824 #1155181 #1155990
#1156353 #1157778 #1158890 #1159356 #1159891
#1162119 #1163403 #1163508 #1164692 #1167689
#1175623 #1176021 #1176140 #1176375 #1176579
#1177369 #1177753 #1179170 #1180894 #1182194
#1182905 #1182917 #1183405 #1183464 #1184594
#1185357 #1185593 #1185594 #1185684 #1185758
#1185857 #1186034 #1186312 #1186316 #1186317
#1186420 #1186442 #1186792 #1187194 #1187508
#1187983 #1189394 #1189483 #1189889 #1190260
#1190460 #1191005 #1191199 #1193878 #1196730
#1196873 SLE-21579 SLE-24335 SLE-25064
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves 7 vulnerabilities, contains three
features and has 54 fixes is now available.
Description:
This update for SCA patterns fixes the following issues:
sca-patterns-base:
- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Core.loadFullFile for sectionless parsing (bsc#1187194)
* Added SUSE.getNetworkInterfaces (bsc#1144162)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Fix SUSE.getFileSystems invalid index error (bsc#1185594)
* Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)
* Removed Novell/OES references from libraries (bsc#1186034)
* Updated documentation for SUSE.compareKernel
* Updated kernel version constants for all SUSE libraries (bsc#1189483)
sca-patterns-hae:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added distribution and service pack subdirectories (bsc#1193878)
* False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl
(bsc#1124793)
* HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)
* supportconfig indicates IPv6 required by HAE, is already enabled
(bsc#1045605)
sca-patterns-suma:
- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool
to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
sca-server-report:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Changed absolute paths to relative ones (bsc#1186316)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Ensure that the legacy SuSE-release file works (bsc#1196730)
* Fix sca report header supportconfig file (bsc#1186442)
* Fix the report file output path (bsc#1180894)
* Removed preprocessor elements for OES Filr eDir (bsc#1186420)
sca-patterns-sle15:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
* bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl,
bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed field reference in sle15all/lvm-00003.pl
* Fixed metadata tags in scc-registered.py
* Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
- New security announcement patterns:
* Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1
SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1
SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1
SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1
* Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1
SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1
SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1
SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1
SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1
SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1
SUSE-SU-2022:0929-1
* Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1
SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1
SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1
SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1
SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1
SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1
SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1
SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1
SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1
* Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1
SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1
SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1
SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1
SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1
SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1
SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1
SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1
SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1
SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1 SUSE-SU-2022:0141-1
SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1
SUSE-SU-2022:0198-1 SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1
SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1
SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1
SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0137-1
SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1
SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1
SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1
SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1
* Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1
SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1 SUSE-SU-2021:1863-2
SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1
SUSE-SU-2021:2459-1 SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1
SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1
SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1
SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1 SUSE-SU-2021:2470-1
* Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1
SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:1951-1
SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1
SUSE-SU-2021:1859-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1
SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1
SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1
SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:1826-1
SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1
SUSE-SU-2021:1999-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1
SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1
SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1
SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:1890-1
SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1
SUSE-SU-2021:1901-1 SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1
SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1
SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1
* May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1
SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1
SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1
SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1
SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1
SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1
SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1
SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1
SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1
SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1
SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1
SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1
SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1
SUSE-SU-2021:1573-1
* May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1
SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 SUSE-SU-2021:1409-1
SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1
SUSE-SU-2021:1430-1 SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1
SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1
SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1
SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1006-1
SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1
SUSE-SU-2021:1179-1 SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1
SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1
SUSE-SU-2021:1455-1
- New regular patterns:
* sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical
Volume is using an old PV header (bsc#1179170)
* sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver
intel_pstate not loading on some Intel Xeon Scalable processors
(bsc#1185758)
* sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE
Linux Enterprise 15 Service Pack 3 KVM guest
* sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading
an RPM reports cpio chmod failed (bsc#1189394)
* sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing
NFS timeouts (bsc#1183405)
* sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane
memory based pmem devices returns HDIO_GETGEO failed with 25
(bsc#1182917)
* sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites
(bsc#1185684)
* sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver
intel_pstate not loading on some Intel Xeon Scalable processors
(bsc#1185758)
* sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails
to boot randomly due to wicked ordering cycle problems (bsc#1176140)
* sle15sp1/qlogic-000019630.py: System crashes when the system is
rebooted with SR-IOV enabled QLogic cards (bsc#1155990)
* sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to
KVM guest results in NMI and unresponsiveness
on host (bsc#1152800)
* sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large
files over NFS (bsc#1163403)
* sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount
over IPv6 (bsc#1144162)
* sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after
updating the kernel (bsc#1159356)
* sle15sp1/namespace-000019571.py: Activation of multiple namespaces
simultaneously may lead to an activation failure (bsc#1157778)
* sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being
accessed by user space (bsc#1154768)
* sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0
not found, device 0x1460 broken BIOS (bsc#1131489)
* sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a
process is restarted (bsc#1177753)
* sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes
option in multipath.conf (bsc#1138452)
* sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP
response 0
* sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis
* sle15all/vmcore-00001.pl: Identifies kernel core dumps for review
* sle15all/udevmac-000020260.py: systemd-udevd Could not generate
persistent MAC address for br0 No such file or directory (bsc#1185357)
* sle15all/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are
hung or stuck
* sle15all/softlock-000018705.py: soft lockup messages about
* sle15all/slapd-000019711.py: slapd.service not enabled/failed after
upgrade from SUSE Linux Enterprise 11 Service Pack 4 to SUSE Linux
Enterprise 15 (bsc#1156353)
* sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs
formatted root partition
* sle15all/sdagentconfig-000020301.py: SCA Appliance configuration
reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
* sle15all/scc-registered.py: Check system registration status
* sle15all/scc-expired.py: Identify if SCC registrations have expired
* sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs
with xz compression (bsc#1155181)
* sle15all/scatool-000004685.py: scatool fails with traceback
* sle15all/proxy-00003.pl: Checks for proxy environment variables
* sle15all/postfix-000020356.py: Postfix fails to start with IPv6
disabled
* sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated
due to OOM scenario (bsc#1182905)
* sle15all/nobarrier-000020240.py: XFS nobarrier option has been
completely deprecated starting from SUSE Linux Enterprise 15 Service
Pack 2 (bsc#1176375)
* sle15all/mysqlperf-000020354.py: mysqld segfault when the system is
under stress (bsc#1186792)
* sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to
Invalid and should be removed (bsc#1179170)
* sle15all/lvm-00005.pl: Duplicate volume groups are usually a
configuration issue
* sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM
metadata
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and
appear missing. This pattern looks for missing physical volumes.
* sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in
crontab file, can't install (bsc#1187508)
* sle15all/coredumpctl-000018634.py: How to obtain systemd service core
dumps
* sle15all/btrfsmaster-000018779.py: BTRFS Master TID
* sle15all/blacklist-000019607.py: System exit to emergency shell at
boot with multipath enabled
* sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)
* sle15all/acpid-000019708.py: acpid.service failed to start after
upgrade (bsc#1158890)
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk
(bsc#1154824)
+ sle15sp2/crosstalk_152-000019643.py
+ sle15sp1/crosstalk_151-000019643.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector
Register sampling (bsc#1156353)
+ sle15sp2/ucodeintel_152-000019635.py
+ sle15sp1/ucodeintel_151-000019635.py
+ sle15sp0/ucodeintel_150-000019635.py
- Renamed pattern files for filename standard
* Renamed patterns/SLE/sle15all/scc-expired.py to
patterns/SLE/sle15all/bhc-scc-expired.py
* Renamed /SLE/sle15all/scc-registered.py to
patterns/SLE/sle15all/bhc-scc-registered.py
- Updated regular patterns:
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and
appear missing. This pattern looks for missing physical volumes
sca-patterns-sle12:
- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
+ bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl,
bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed metadata tags for scc-registered.py
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
* Updated scc-registered.py pattern to fix registration detection
- New security announcement patterns:
* Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1
SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1
SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1
SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1
SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1
SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
* Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1
SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1
SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1
SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1
SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1
SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1
SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1
SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1
SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1
SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1
SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1
SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1
* Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1
SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1
SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1
SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1
SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1
SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1
SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1
SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1
SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1
SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1
SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1
SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1
SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1
SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1
SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1
SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
* Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1
SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1
SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1
SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1
SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1
SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1
SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1
SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1
SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1
SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1
SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1
SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1
SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1
SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1
SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1
SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0161-1
SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1
SUSE-SU-2022:0060-1 SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1
SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1
SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1
SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1 SUSE-SU-2022:0166-1
SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1
SUSE-SU-2022:0160-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1
SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1
SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1
SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1
SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1
SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1
SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1
SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1
SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1
SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
* Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1
SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1 SUSE-SU-2021:1906-1
SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1
SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1
SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1 SUSE-SU-2021:1887-1
SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1
SUSE-SU-2021:1822-1 SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1
SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1
SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1
SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1
SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1
SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1
SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2
SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1
SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1
SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1
SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1
SUSE-SU-2021:2042-1 SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1
SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1
SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1
SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1
* May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1
SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1 SUSE-SU-2021:1782-1
SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1
SUSE-SU-2021:1766-1 SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1
SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1
SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1 SUSE-SU-2021:1492-1
SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1
SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1
SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1
SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1
SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1
SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1
SUSE-SU-2021:1469-1
* Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1
SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1 SUSE-SU-2021:1242-1
SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1
SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1
SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1
SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1
SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1
SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1
SUSE-SU-2021:1315-1 SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1
SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1
SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1
SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1165-1
SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1
SUSE-SU-2021:1187-1 SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1
SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1
SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1
SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1075-1
SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1
SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1
SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1
SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1
SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1
SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1
SUSE-SU-2021:1189-1
* Mar 2021 New Security Announcement Patterns (79) for
SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1 SUSE-SU-2021:0929-1
SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1
SUSE-SU-2021:0794-1 SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1
SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1
SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1
SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1
SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1
SUSE-SU-2021:0739-1 SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1
SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1
SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1
SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2
SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1
SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1
SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1
SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0794-1
SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1
SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1
SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1
SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1
SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1
SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1
SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1
SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1
SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1
SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1 SUSE-SU-2021:0801-1
SUSE-SU-2021:0756-1
- New regular patterns:
* sle12sp5/vmtools-000004682.py: Extensive logging in
vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be
corrupted (bsc#1177369)
* sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration
reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
* sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 Service Pack 5
* sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for
SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for
SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been
completely deprecated starting from SUSE Linux Enterprise 15 Service
Pack 2 (bsc#1176375)
* sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing
NFS timeouts (bsc#1183405)
* sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large
files over NFS (bsc#1163403)
* sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount
over IPv6 (bsc#1144162)
* sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 -
Assertion failed (bsc#1175623)
* sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for
SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for
SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for
SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver
intel_pstate not loading on some Intel Xeon Scalable processors
(bsc#1185758)
* sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a
process is restarted (bsc#1182194)
* sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in
crontab file, can't install (bsc#1187508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS
maintenance task (bsc#1163508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS
maintenance task (bsc#1163508)
* sle12sp4/vmtools-000004682.py: Extensive logging in
vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux
Enterprise 12 Service Pack 4 System with Kernel 4.12.14-95.48-default
may crash the system (bsc#1176579)
* sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be
corrupted (bsc#1177369)
* sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration
reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
* sle12sp4/plymouth-000019595.py: plymouth hang - login to console not
possible
* sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been
completely deprecated starting from SUSE Linux Enterprise 15 Service
Pack 2 (bsc#1176375)
* sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large
files over NFS (bsc#1163403)
* sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes
option in multipath.conf (bsc#1138452)
* sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a
process is restarted (bsc#1182194)
* sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in
crontab file, can't install (bsc#1187508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS
maintenance task (bsc#1163508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS
maintenance task (bsc#1163508)
* sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes
option in multipath.conf (bsc#1138452)
* sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP
response 0
* sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472
(bsc#1176579)
* sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are
hung or stuck
* sle12all/softlock-000018705.py: soft lockup messages about
* sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs
formatted root partition
* sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs
with xz compression (bsc#1186316)
* sle12all/postfix-000020356.py: Postfix fails to start with IPv6
disabled
* sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to
Invalid and should be removed
* sle12all/lvm-volume-list-7016683.py: Fixed execution error
* sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle12all/coredumpctl-000018634.py: How to obtain systemd service core
dumps
* sle12all/btrfsmaster-000018779.py: BTRFS Master TID
* sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are
not working anymore (bsc#1159891)
* sle12all/blacklist-000019607.py: System exit to emergency shell at
boot with multipath enabled
* CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth
+ sle12sp5/bleedingtooth_125-000019735.py
+ sle12sp4/bleedingtooth_124-000019735.py
+ sle12sp3/bleedingtooth_123-000019735.py
+ sle12sp2/bleedingtooth_122-000019735.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector
Register sampling (bsc#1156353)
+ sle12sp5/ucodeintel_125-000019635.py
+ sle12sp4/ucodeintel_124-000019635.py
+ sle12sp3/ucodeintel_123-000019635.py
+ sle12sp2/ucodeintel_122-000019635.py
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk
(bsc#1154824)
+ sle12sp5/crosstalk_125-000019643.py
+ sle12sp4/crosstalk_124-000019643.py
+ sle12sp3/crosstalk_123-000019643.py
+ sle12sp2/crosstalk_122-000019643.py
- Updated patterns:
* sle12all/scc-expired.py: Identify if SCC registrations have expired
* sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and
appear missing. This pattern looks for missing physical volumes
* sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM
metadata
* sle12all/lvm-00005.pl: Duplicate volume groups are usually a
configuration issue
- Renamed patterns for file standard:
* Renamed patterns/SLE/sle12all/scc-expired.py to
patterns/SLE/sle12all/bhc-scc-expired.py
* Renamed patterns/SLE/sle12all/scc-registered.py to
patterns/SLE/sle12all/bhc-scc-registered.py
- Deleted regular patterns (1)
* sle12all/systemd-current-failed-7017137.py: Moved to service packs
with fixes (bsc#1187983)
* sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)
* sle12all/pdc-00001.pl: Pattern removed OES Dependent
* sle12all/pdc-00002.pl: Pattern removed OES Dependent
* sle12all/lvm-00001.pl: Pattern removed
* sle12all/lvm-00002.pl: Pattern removed
sca-patterns-sle11:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Removed OES dependent patterns (bsc#1196873)
- New security announcement patterns:
* Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1
SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
* Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1
SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1
SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1
SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1
SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
* Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1
SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1
SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1
SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1
SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1
SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1
SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1
SUSE-SU-2022:14894-1
* Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1
SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1
SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1
SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1
SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1
SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1
SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1
SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1
SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1
SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1
* Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1
SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1 SUSE-SU-2021:14761-1
* Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1
SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1 SUSE-SU-2021:14743-1
SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1
SUSE-SU-2021:14740-1 SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1
SUSE-SU-2021:14749-1
* May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1
SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1 SUSE-SU-2021:14714-1
* Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1
SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1 SUSE-SU-2021:14700-1
SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1
SUSE-SU-2021:14712-1 SUSE-SU-2021:14692-1
- New regular patterns:
* sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle11all/softlock-000018705.py: soft lockup messages about
* sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs
formatted root partition
* sle11all/btrfsmaster-000018779.py: BTRFS Master TID
* CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register
Buffer Data Sampling aka CrossTalk (bsc#1154824)
- Deleted regular patterns:
* sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)
Patch Instructions:
To install this SUSE Feature Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-4496=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496=1
Package List:
- openSUSE Leap 15.3 (noarch):
sca-patterns-base-1.5.0-150300.10.3.1
sca-patterns-hae-1.5.1-150300.10.3.1
sca-patterns-sle11-1.5.1-150300.18.3.1
sca-patterns-sle12-1.5.1-150300.3.3.1
sca-patterns-sle15-1.5.1-150300.14.3.1
sca-patterns-suma-1.5.0-150300.9.3.1
sca-server-report-1.5.1-150300.11.3.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch):
sca-patterns-base-1.5.0-150300.10.3.1
sca-patterns-hae-1.5.1-150300.10.3.1
sca-patterns-sle11-1.5.1-150300.18.3.1
sca-patterns-sle12-1.5.1-150300.3.3.1
sca-patterns-sle15-1.5.1-150300.14.3.1
sca-patterns-suma-1.5.0-150300.9.3.1
sca-server-report-1.5.1-150300.11.3.1
References:
https://www.suse.com/security/cve/CVE-2020-0543.html
https://www.suse.com/security/cve/CVE-2020-0548.html
https://www.suse.com/security/cve/CVE-2020-0549.html
https://www.suse.com/security/cve/CVE-2020-12351.html
https://www.suse.com/security/cve/CVE-2020-12352.html
https://www.suse.com/security/cve/CVE-2020-1472.html
https://www.suse.com/security/cve/CVE-2020-24490.html
https://bugzilla.suse.com/1045605
https://bugzilla.suse.com/1124793
https://bugzilla.suse.com/1131489
https://bugzilla.suse.com/1138452
https://bugzilla.suse.com/1144162
https://bugzilla.suse.com/1152800
https://bugzilla.suse.com/1154768
https://bugzilla.suse.com/1154824
https://bugzilla.suse.com/1155181
https://bugzilla.suse.com/1155990
https://bugzilla.suse.com/1156353
https://bugzilla.suse.com/1157778
https://bugzilla.suse.com/1158890
https://bugzilla.suse.com/1159356
https://bugzilla.suse.com/1159891
https://bugzilla.suse.com/1162119
https://bugzilla.suse.com/1163403
https://bugzilla.suse.com/1163508
https://bugzilla.suse.com/1164692
https://bugzilla.suse.com/1167689
https://bugzilla.suse.com/1175623
https://bugzilla.suse.com/1176021
https://bugzilla.suse.com/1176140
https://bugzilla.suse.com/1176375
https://bugzilla.suse.com/1176579
https://bugzilla.suse.com/1177369
https://bugzilla.suse.com/1177753
https://bugzilla.suse.com/1179170
https://bugzilla.suse.com/1180894
https://bugzilla.suse.com/1182194
https://bugzilla.suse.com/1182905
https://bugzilla.suse.com/1182917
https://bugzilla.suse.com/1183405
https://bugzilla.suse.com/1183464
https://bugzilla.suse.com/1184594
https://bugzilla.suse.com/1185357
https://bugzilla.suse.com/1185593
https://bugzilla.suse.com/1185594
https://bugzilla.suse.com/1185684
https://bugzilla.suse.com/1185758
https://bugzilla.suse.com/1185857
https://bugzilla.suse.com/1186034
https://bugzilla.suse.com/1186312
https://bugzilla.suse.com/1186316
https://bugzilla.suse.com/1186317
https://bugzilla.suse.com/1186420
https://bugzilla.suse.com/1186442
https://bugzilla.suse.com/1186792
https://bugzilla.suse.com/1187194
https://bugzilla.suse.com/1187508
https://bugzilla.suse.com/1187983
https://bugzilla.suse.com/1189394
https://bugzilla.suse.com/1189483
https://bugzilla.suse.com/1189889
https://bugzilla.suse.com/1190260
https://bugzilla.suse.com/1190460
https://bugzilla.suse.com/1191005
https://bugzilla.suse.com/1191199
https://bugzilla.suse.com/1193878
https://bugzilla.suse.com/1196730
https://bugzilla.suse.com/1196873
1
0
SUSE-RU-2022:4499-1: moderate: Recommended update for openssh
by maintenance@opensuse.org 15 Dec '22
by maintenance@opensuse.org 15 Dec '22
15 Dec '22
SUSE Recommended Update: Recommended update for openssh
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:4499-1
Rating: moderate
References: #1179465
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Desktop Applications 15-SP3
SUSE Linux Enterprise Module for Desktop Applications 15-SP4
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.2
openSUSE Leap Micro 5.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for openssh fixes the following issues:
- Make ssh connections update their dbus environment (bsc#1179465):
* Add openssh-dbus.sh, openssh-dbus.csh, openssh-dbus.fish
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.3:
zypper in -t patch openSUSE-Leap-Micro-5.3-2022-4499=1
- openSUSE Leap Micro 5.2:
zypper in -t patch openSUSE-Leap-Micro-5.2-2022-4499=1
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-4499=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-4499=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-4499=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4499=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-4499=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-4499=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-4499=1
- SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2022-4499=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-4499=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-4499=1
Package List:
- openSUSE Leap Micro 5.3 (aarch64 x86_64):
openssh-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
- openSUSE Leap Micro 5.2 (aarch64 x86_64):
openssh-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
openssh-8.4p1-150300.3.15.4
openssh-askpass-gnome-8.4p1-150300.3.15.2
openssh-askpass-gnome-debuginfo-8.4p1-150300.3.15.2
openssh-askpass-gnome-debugsource-8.4p1-150300.3.15.2
openssh-cavs-8.4p1-150300.3.15.4
openssh-cavs-debuginfo-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-helpers-8.4p1-150300.3.15.4
openssh-helpers-debuginfo-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
openssh-8.4p1-150300.3.15.4
openssh-askpass-gnome-8.4p1-150300.3.15.2
openssh-askpass-gnome-debuginfo-8.4p1-150300.3.15.2
openssh-askpass-gnome-debugsource-8.4p1-150300.3.15.2
openssh-cavs-8.4p1-150300.3.15.4
openssh-cavs-debuginfo-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-helpers-8.4p1-150300.3.15.4
openssh-helpers-debuginfo-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
openssh-askpass-gnome-8.4p1-150300.3.15.2
openssh-askpass-gnome-debuginfo-8.4p1-150300.3.15.2
openssh-askpass-gnome-debugsource-8.4p1-150300.3.15.2
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
openssh-askpass-gnome-8.4p1-150300.3.15.2
openssh-askpass-gnome-debuginfo-8.4p1-150300.3.15.2
openssh-askpass-gnome-debugsource-8.4p1-150300.3.15.2
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
openssh-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-helpers-8.4p1-150300.3.15.4
openssh-helpers-debuginfo-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
openssh-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-helpers-8.4p1-150300.3.15.4
openssh-helpers-debuginfo-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
- SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):
openssh-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
openssh-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
openssh-8.4p1-150300.3.15.4
openssh-clients-8.4p1-150300.3.15.4
openssh-clients-debuginfo-8.4p1-150300.3.15.4
openssh-common-8.4p1-150300.3.15.4
openssh-common-debuginfo-8.4p1-150300.3.15.4
openssh-debuginfo-8.4p1-150300.3.15.4
openssh-debugsource-8.4p1-150300.3.15.4
openssh-fips-8.4p1-150300.3.15.4
openssh-server-8.4p1-150300.3.15.4
openssh-server-debuginfo-8.4p1-150300.3.15.4
References:
https://bugzilla.suse.com/1179465
1
0