Bugzilla release notes12/19/2023 ![]() arm64: Add missing ISB after invalidating TLB in _primary_switch arm64: set plt* section addresses to 0x0 (git-fixes) ARM: 9110/1: oabi-compat: fix oabi epoll sparse warning (bsc#1129770) ACPI: property: Release subnode properties with data nodes (git-fixes). The following non-security bugs were fixed: Intel(R) 82599 Ethernet Controllers and Adapters that may have allowedĪn authenticated user to potentially enable denial of service via local CVE-2021-33061: Fixed insufficient control flow management for the CVE-2022-30594: Fixed restriction bypass on setting the User interaction is not needed for exploitation (bnc#1197219). To local information disclosure with System execution privileges needed. Possible out of bounds read due to Incorrect Size Value. CVE-2021-39711: In bpf_prog_test_run_skb of test_run.c, there is a CVE-2022-1734: Fixed a r/w use-after-free when non synchronized betweenĬleanup routine and firmware download routine. CVE-2022-1652: Fixed a statically allocated error counter inside the CVE-2022-21499: Reinforce the kernel lockdown feature, until now it'sīeen trivial to break out of it with kgdb or kdb. Mounting and operating on a corrupted image. CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self CVE-2019-19377: Fixed an user-after-free that could be triggered when anĪttacker mounts a crafted btrfs filesystem image. This flaw allowed a local attacker with user access to cause a privilege CVE-2022-1966: Fixed an use-after-free bug in the netfilter subsystem. Simulating an nfc device from user-space. CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by Kernel by simulating nfc device from user-space. CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux ![]() CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited To speculatively/transiently disclose information via spectre like CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited The SUSE Linux Enterprise 12 SP5 kernel was updated. SUSE Linux Enterprise Workstation Extension 12-SP5Īn update that solves 17 vulnerabilities and has 26 fixes SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Live Patching 12-SP5 SUSE Linux Enterprise High Performance Computing 12-SP5 SUSE Linux Enterprise High Availability 12-SP5 SUSE Security Update: Security update for the Linux Kernel SUSE Linux Enterprise Desktop 12-SP5, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP5, SUSE Linux Enterprise Workstation Extension 12-SP5, SUSE Linux Enterprise Live Patching 12-SP5, SUSE Linux Enterprise High Availability 12-SP5, SUSE Linux Enterprise High Performance Computing 12-SP5, SUSE Linux Enterprise Server for SAP Applications 12-SP5
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |