{"affected":[{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.116.1","dlm-kmp-default":"4.12.14-122.116.1","gfs2-kmp-default":"4.12.14-122.116.1","ocfs2-kmp-default":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.116.1","kernel-default-kgraft-devel":"4.12.14-122.116.1","kgraft-patch-4_12_14-122_116-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.116.1","kernel-default-kgraft-devel":"4.12.14-122.116.1","kgraft-patch-4_12_14-122_116-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_30","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_30&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"4.12.14-122.116.1","kernel-obs-build":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"4.12.14-122.116.1","kernel-obs-build":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-122.116.1","kernel-default-base":"4.12.14-122.116.1","kernel-default-devel":"4.12.14-122.116.1","kernel-default-man":"4.12.14-122.116.1","kernel-devel":"4.12.14-122.116.1","kernel-macros":"4.12.14-122.116.1","kernel-source":"4.12.14-122.116.1","kernel-syms":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-122.116.1","kernel-default-base":"4.12.14-122.116.1","kernel-default-devel":"4.12.14-122.116.1","kernel-default-man":"4.12.14-122.116.1","kernel-devel":"4.12.14-122.116.1","kernel-macros":"4.12.14-122.116.1","kernel-source":"4.12.14-122.116.1","kernel-syms":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-122.116.1","kernel-default-base":"4.12.14-122.116.1","kernel-default-devel":"4.12.14-122.116.1","kernel-default-man":"4.12.14-122.116.1","kernel-devel":"4.12.14-122.116.1","kernel-macros":"4.12.14-122.116.1","kernel-source":"4.12.14-122.116.1","kernel-syms":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-122.116.1","kernel-default-base":"4.12.14-122.116.1","kernel-default-devel":"4.12.14-122.116.1","kernel-default-man":"4.12.14-122.116.1","kernel-devel":"4.12.14-122.116.1","kernel-macros":"4.12.14-122.116.1","kernel-source":"4.12.14-122.116.1","kernel-syms":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-122.116.1","kernel-default-base":"4.12.14-122.116.1","kernel-default-devel":"4.12.14-122.116.1","kernel-default-man":"4.12.14-122.116.1","kernel-devel":"4.12.14-122.116.1","kernel-macros":"4.12.14-122.116.1","kernel-source":"4.12.14-122.116.1","kernel-syms":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-122.116.1","kernel-default-base":"4.12.14-122.116.1","kernel-default-devel":"4.12.14-122.116.1","kernel-default-man":"4.12.14-122.116.1","kernel-devel":"4.12.14-122.116.1","kernel-macros":"4.12.14-122.116.1","kernel-source":"4.12.14-122.116.1","kernel-syms":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-extra":"4.12.14-122.116.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.116.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)\n- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)\n- CVE-2022-0812: Fixed an incorrect header size calculations which could lead to a memory leak. (bsc#1196639)\n- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)\n- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)\n- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)\n- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)\n- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bnc#1196973)\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)\n- CVE-2022-0001,CVE-2022-0002,CVE-2022-23960: Fixed a new kind of speculation issues, exploitable via JITed eBPF for instance. (bsc#1191580)\n- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)\n\nThe following non-security bugs were fixed:\n\n- asix: Add rx->ax_skb = NULL after usbnet_skb_return() (git-fixes).\n- asix: Ensure asix_rx_fixup_info members are all reset (git-fixes).\n- asix: Fix small memory leak in ax88772_unbind() (git-fixes).\n- asix: fix uninit-value in asix_mdio_read() (git-fixes).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).\n- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).\n- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).\n- can: dev: can_restart: fix use after free bug (git-fixes).\n- cgroup: Correct privileges check in release_agent writes (bsc#1196723).\n- cgroup: Allocate cgroup_file_ctx for kernfs_open_file->priv (bsc#1196723).\n- cgroup: Use open-time cgroup namespace for process migration perm checks (bsc#1196723).\n- dax: update to new mmu_notifier semantic (bsc#1184207).\n- drm: add a locked version of drm_is_current_master (bsc#1197914).\n- drm: drm_file struct kABI compatibility workaround (bsc#1197914).\n- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).\n- drm: serialize drm_file.master with a new spinlock (bsc#1197914).\n- drm: use the lookup lock in drm_is_current_master (bsc#1197914).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1114648).\n- ena_netdev: use generic power management (bsc#1197099 jsc#SLE-24125).\n- ena: Remove rcu_read_lock() around XDP program invocation (bsc#1197099 jsc#SLE-24125).\n- ethernet: amazon: ena: A typo fix in the file ena_com.h (bsc#1197099 jsc#SLE-24125).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).\n- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix lazy initialization next schedule time computation in more granular unit (bsc#1194580).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).\n- ext4: update i_disksize if direct write past ondisk size (bsc#1197806).\n- genirq: Use rcu in kstat_irqs_usr() (bsc#1193738).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- IB/core: Fix ODP get user pages flow (git-fixes)\n- IB/hfi1: Acquire lock to release TID entries when user file is closed (git-fixes)\n- IB/hfi1: Adjust pkey entry in index 0 (git-fixes)\n- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes)\n- IB/hfi1: Ensure pq is not left on waitlist (git-fixes)\n- IB/hfi1: Fix another case where pq is left on waitlist (git-fixes)\n- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)\n- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes)\n- IB/hfi1: Fix possible null-pointer dereference in _extend_sdma_tx_descs() (git-fixes)\n- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes)\n- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)\n- IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields (git-fixes)\n- IB/qib: Use struct_size() helper (git-fixes)\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes)\n- IB/umad: Return EIO in case of when device disassociated (git-fixes)\n- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)\n- isofs: Fix out of bound access for corrupted isofs image (bsc#1194591).\n- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).\n- macros.kernel-source: Fix conditional expansion. Fixes: bb95fef3cf19 ('rpm: Use bash for %() expansion (jsc#SLE-18234).')\n- mdio: fix mdio-thunder.c dependency build error (git-fixes).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: drop NULL return check of pte_offset_map_lock() (bsc#1184207).\n- mm/rmap: always do TTU_IGNORE_ACCESS (bsc#1184207).\n- mm/rmap: update to new mmu_notifier semantic v2 (bsc#1184207).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: asix: add proper error handling of usb read errors (git-fixes).\n- net: asix: fix uninit value bugs (git-fixes).\n- net: bcmgenet: Fix a resource leak in an error handling path in the probe functin (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: dsa: bcm_sf2: put device node before return (git-fixes).\n- net: ena: Add capabilities field with support for ENI stats capability (bsc#1197099 jsc#SLE-24125).\n- net: ena: Add debug prints for invalid req_id resets (bsc#1197099 jsc#SLE-24125).\n- net: ena: add device distinct log prefix to files (bsc#1197099 jsc#SLE-24125).\n- net: ena: add jiffies of last napi call to stats (bsc#1197099 jsc#SLE-24125).\n- net: ena: aggregate doorbell common operations into a function (bsc#1197099 jsc#SLE-24125).\n- net: ena: aggregate stats increase into a function (bsc#1197099 jsc#SLE-24125).\n- net: ena: Change ENI stats support check to use capabilities field (bsc#1197099 jsc#SLE-24125).\n- net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1197099 jsc#SLE-24125).\n- net: ena: Change the name of bad_csum variable (bsc#1197099 jsc#SLE-24125).\n- net: ena: Extract recurring driver reset code into a function (bsc#1197099 jsc#SLE-24125).\n- net: ena: fix coding style nits (bsc#1197099 jsc#SLE-24125).\n- net: ena: fix DMA mapping function issues in XDP (bsc#1197099 jsc#SLE-24125).\n- net: ena: fix inaccurate print type (bsc#1197099 jsc#SLE-24125).\n- net: ena: Fix wrong rx request id by resetting device (bsc#1197099 jsc#SLE-24125).\n- net: ena: Improve error logging in driver (bsc#1197099 jsc#SLE-24125).\n- net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1197099 jsc#SLE-24125).\n- net: ena: introduce XDP redirect implementation (bsc#1197099 jsc#SLE-24125).\n- net: ena: make symbol 'ena_alloc_map_page' static (bsc#1197099 jsc#SLE-24125).\n- net: ena: Move reset completion print to the reset function (bsc#1197099 jsc#SLE-24125).\n- net: ena: optimize data access in fast-path code (bsc#1197099 jsc#SLE-24125).\n- net: ena: re-organize code to improve readability (bsc#1197099 jsc#SLE-24125).\n- net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1197099 jsc#SLE-24125).\n- net: ena: remove extra words from comments (bsc#1197099 jsc#SLE-24125).\n- net: ena: Remove module param and change message severity (bsc#1197099 jsc#SLE-24125).\n- net: ena: Remove redundant return code check (bsc#1197099 jsc#SLE-24125).\n- net: ena: Remove unused code (bsc#1197099 jsc#SLE-24125).\n- net: ena: store values in their appropriate variables types (bsc#1197099 jsc#SLE-24125).\n- net: ena: Update XDP verdict upon failure (bsc#1197099 jsc#SLE-24125).\n- net: ena: use build_skb() in RX path (bsc#1197099 jsc#SLE-24125).\n- net: ena: use constant value for net_device allocation (bsc#1197099 jsc#SLE-24125).\n- net: ena: Use dev_alloc() in RX buffer allocation (bsc#1197099 jsc#SLE-24125).\n- net: ena: Use pci_sriov_configure_simple() to enable VFs (bsc#1197099 jsc#SLE-24125).\n- net: ena: use xdp_frame in XDP TX flow (bsc#1197099 jsc#SLE-24125).\n- net: ena: use xdp_return_frame() to free xdp frames (bsc#1197099 jsc#SLE-24125).\n- net: ethernet: Fix memleak in ethoc_probe (git-fixes).\n- net: ethernet: ti: cpts: fix ethtool output when no ptp_clock registered (git-fixes).\n- net: fec: only check queue 0 if RXF_0/TXF_0 interrupt is set (git-fixes).\n- net: hdlc_ppp: Fix issues when mod_timer is called while timer is running (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hns: fix return value check in __lb_other_process() (git-fixes).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mcs7830: handle usb read errors properly (git-fixes).\n- net: usb: asix: add error handling for asix_mdio_* functions (git-fixes).\n- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).\n- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- netxen_nic: fix MSI/MSI-x interrupts (git-fixes).\n- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).\n- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).\n- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).\n- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).\n- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).\n- NFS: Clamp WRITE offsets (git-fixes).\n- NFS: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).\n- NFS: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).\n- NFS: Fix another issue with a list iterator pointing to the head (git-fixes).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- ocfs2: remove ocfs2_is_o2cb_active() (bsc#1197758).\n- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15288, jsc#ECO-2990).\n- powerpc/64: Fix kernel stack 16-byte alignment (bsc#1196999 ltc#196609S git-fixes).\n- powerpc/64: Interrupts save PPR on stack rather than thread_struct (bsc#1196999 ltc#196609).\n- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jec#SLE-23780).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jec#SLE-23780).\n- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/xive: fix return value of __setup handler (bsc#1065729).\n- printk: Add panic_in_progress helper (bsc#1197894).\n- printk: disable optimistic spin during panic (bsc#1197894).\n- qed: select CONFIG_CRC32 (git-fixes).\n- quota: correct error number in free_dqentry() (bsc#1194590).\n- RDMA/addr: Be strict with gid size (git-fixes)\n- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)\n- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)\n- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes)\n- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)\n- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)\n- RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests (git-fixes)\n- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes)\n- RDMA/core: Do not infoleak GRH fields (git-fixes)\n- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes)\n- RDMA/cxgb4: add missing qpid increment (git-fixes)\n- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)\n- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)\n- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)\n- RDMA/cxgb4: Set queue pair state when being queried (git-fixes)\n- RDMA/cxgb4: Validate the number of CQEs (git-fixes)\n- RDMA/hns: Add a check for current state before modifying QP (git-fixes)\n- RDMA/hns: Encapsulate some lines for setting sq size in user mode (git-fixes)\n- RDMA/hns: Optimize hns_roce_modify_qp function (git-fixes)\n- RDMA/hns: Prevent undefined behavior in hns_roce_set_user_sq_size() (git-fixes)\n- RDMA/hns: Validate the pkey index (git-fixes)\n- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)\n- RDMA/ib_srp: Fix a deadlock (git-fixes)\n- RDMA/iwcm: Release resources if iw_cm module initialization fails (git-fixes)\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes)\n- RDMA/mlx4: Return missed an error if device does not support steering (git-fixes)\n- RDMA/mlx5: Do not allow rereg of a ODP MR (git-fixes)\n- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)\n- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)\n- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes)\n- RDMA/mlx5: Put live in the correct place for ODP MRs (git-fixes)\n- RDMA/odp: Lift umem_mutex out of ib_umem_odp_unmap_dma_pages() (git-fixes)\n- RDMA/qedr: Fix NULL deref for query_qp on the GSI QP (git-fixes)\n- RDMA/qib: Remove superfluous fallthrough statements (git-fixes)\n- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)\n- RDMA/rxe: Compute PSN windows correctly (git-fixes)\n- RDMA/rxe: Correct skb on loopback path (git-fixes)\n- RDMA/rxe: Do not overwrite errno from ib_umem_get() (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)\n- RDMA/rxe: Fix extra copy in prepare_ack_packet (git-fixes)\n- RDMA/rxe: Fix failure during driver load (git-fixes)\n- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)\n- RDMA/rxe: Fix over copying in get_srq_wqe (git-fixes)\n- RDMA/rxe: Fix panic when calling kmem_cache_create() (git-fixes)\n- RDMA/rxe: Fix redundant call to ip_send_check (git-fixes)\n- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (git-fixes)\n- RDMA/rxe: Fix wrong port_cap_flags (git-fixes)\n- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (git-fixes)\n- RDMA/rxe: Remove rxe_link_layer() (git-fixes)\n- RDMA/rxe: Return CQE error if invalid lkey was supplied (git-fixes)\n- RDMA/ucma: Fix locking for ctx->events_reported (git-fixes)\n- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)\n- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes)\n- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)\n- s390/bpf: Perform r1 range checking before accessing jit->seen_reg (git-fixes).\n- s390/disassembler: increase ebpf disasm buffer size (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).\n- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).\n- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).\n- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).\n- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Fix typos in comments (bsc#1197675).\n- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).\n- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).\n- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).\n- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).\n- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).\n- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).\n- scsi: lpfc: Use fc_block_rport() (bsc#1197675).\n- scsi: lpfc: Use kcalloc() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).\n- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).\n- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).\n- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).\n- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).\n- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).\n- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).\n- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).\n- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).\n- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).\n- scsi: qla2xxx: Fix typos in comments (bsc#1197661).\n- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).\n- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).\n- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).\n- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).\n- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).\n- sr9700: sanity check for packet length (bsc#1196836).\n- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- SUNRPC: Fix transport accounting when caller specifies an rpc_xprt (bsc#1197531).\n- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).\n- tcp: change source port randomizarion at connect() time (bsc#1180153).\n- tcp: Export tcp_{sendpage,sendmsg}_locked() for ipv6 (bsc#1194541).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- USB: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).\n- USB: chipidea: fix interrupt deadlock (git-fixes).\n- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).\n- USB: ftdi-elan: fix memory leak on device disconnect (git-fixes).\n- USB: host: xen-hcd: add missing unlock in error path (git-fixes).\n- USB: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).\n- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: option: add support for DW5829e (git-fixes).\n- USB: serial: option: add Telit LE910R1 compositions (git-fixes).\n- USB: serial: option: add ZTE MF286D modem (git-fixes).\n- USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).\n- USB: zaurus: support another broken Zaurus (git-fixes).\n- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).\n- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT (bsc#1114648).\n- x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1114648).\n- xen/gntdev: update to new mmu_notifier semantic (bsc#1184207).\n- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).\n- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).\n- xhci: Fresco FL1100 controller should not have BROKEN_MSI quirk set (git-fixes).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n","id":"SUSE-SU-2022:1196-1","modified":"2022-04-14T06:56:48Z","published":"2022-04-14T06:56:48Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20221196-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1114648"},{"type":"REPORT","url":"https://bugzilla.suse.com/1180153"},{"type":"REPORT","url":"https://bugzilla.suse.com/1184207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191451"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192273"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193738"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194541"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194586"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195403"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196018"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196367"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196488"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196514"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196999"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197099"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197331"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197531"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197661"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197675"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197755"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197760"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1198031"},{"type":"REPORT","url":"https://bugzilla.suse.com/1198032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1198033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-39713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-45868"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-1016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-1048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23036"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23037"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23040"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23041"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23960"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-26490"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-26966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-27666"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-28388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-28389"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-28390"}],"related":["CVE-2021-39713","CVE-2021-45868","CVE-2022-0001","CVE-2022-0002","CVE-2022-0812","CVE-2022-0850","CVE-2022-1016","CVE-2022-1048","CVE-2022-23036","CVE-2022-23037","CVE-2022-23038","CVE-2022-23039","CVE-2022-23040","CVE-2022-23041","CVE-2022-23042","CVE-2022-23960","CVE-2022-26490","CVE-2022-26966","CVE-2022-27666","CVE-2022-28388","CVE-2022-28389","CVE-2022-28390"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-39713","CVE-2021-45868","CVE-2022-0001","CVE-2022-0002","CVE-2022-0812","CVE-2022-0850","CVE-2022-1016","CVE-2022-1048","CVE-2022-23036","CVE-2022-23037","CVE-2022-23038","CVE-2022-23039","CVE-2022-23040","CVE-2022-23041","CVE-2022-23042","CVE-2022-23960","CVE-2022-26490","CVE-2022-26966","CVE-2022-27666","CVE-2022-28388","CVE-2022-28389","CVE-2022-28390"]}