SUSE-SU-2022:3265-1: important: Security update for the Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Sep 14 10:35:12 UTC 2022


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:3265-1
Rating:             important
References:         #1054914 #1065729 #1078216 #1093777 #1094120 
                    #1107937 #1120716 #1141488 #1179310 #1181862 
                    #1189904 #1190397 #1191881 #1194535 #1196616 
                    #1197158 #1198388 #1199617 #1199665 #1201019 
                    #1201264 #1201420 #1201442 #1201610 #1201705 
                    #1201726 #1201948 #1202017 #1202096 #1202154 
                    #1202346 #1202347 #1202393 #1202396 #1202528 
                    #1202577 #1202672 #1202830 #1202897 #1202898 
                    #1203013 #1203098 #1203126 
Cross-References:   CVE-2020-36516 CVE-2021-4203 CVE-2022-20368
                    CVE-2022-20369 CVE-2022-21385 CVE-2022-2588
                    CVE-2022-26373 CVE-2022-2639 CVE-2022-29581
                    CVE-2022-2977 CVE-2022-3028 CVE-2022-36879
                   
CVSS scores:
                    CVE-2020-36516 (NVD) : 5.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
                    CVE-2020-36516 (SUSE): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
                    CVE-2021-4203 (NVD) : 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2021-4203 (SUSE): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L
                    CVE-2022-20368 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-20368 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-20369 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-20369 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-21385 (NVD) : 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-21385 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-2588 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-26373 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-26373 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-2639 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-2639 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
                    CVE-2022-29581 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-29581 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-2977 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-3028 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3028 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-36879 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-36879 (SUSE): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Desktop 12-SP5
                    SUSE Linux Enterprise High Availability 12-SP5
                    SUSE Linux Enterprise High Performance Computing 12-SP5
                    SUSE Linux Enterprise Live Patching 12-SP5
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server for SAP Applications 12-SP5
                    SUSE Linux Enterprise Software Development Kit 12-SP5
                    SUSE Linux Enterprise Workstation Extension 12-SP5
______________________________________________________________________________

   An update that solves 12 vulnerabilities and has 31 fixes
   is now available.

Description:


   The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various
   security and bugfixes.


   The following security bugs were fixed:

   - CVE-2022-36879: Fixed an issue in xfrm_expand_policies in
     net/xfrm/xfrm_policy.c where a refcount could be dropped twice
     (bnc#1201948).
   - CVE-2022-3028: Fixed race condition that was found in the IP framework
     for transforming packets (XFRM subsystem) (bnc#1202898).
   - CVE-2022-2977: Fixed reference counting for struct tpm_chip
     (bsc#1202672).
   - CVE-2022-29581: Fixed improper update of reference count vulnerability
     in net/sched that allowed a local attacker to cause privilege escalation
     to root (bnc#1199665).
   - CVE-2022-2639: Fixed an integer coercion error that was found in the
     openvswitch kernel module (bnc#1202154).
   - CVE-2022-26373: Fixed non-transparent sharing of return predictor
     targets between contexts in some Intel Processors (bnc#1201726).
   - CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
   - CVE-2022-21385: Fixed a flaw in net_rds_alloc_sgs() that allowed
     unprivileged local users to crash the machine (bnc#1202897).
   - CVE-2022-20369: Fixed possible out of bounds write due to improper input
     validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
   - CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg()
     (bsc#1202346).
   - CVE-2021-4203: Fixed use-after-free read flaw that was found in
     sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and
     SO_PEERGROUPS race with listen() (bnc#1194535).
   - CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where
     an attacker was able to inject data into or terminate a victim's TCP
     session (bnc#1196616).

   The following non-security bugs were fixed:

   - 9p: migrate from sync_inode to filemap_fdatawrite_wbc (bsc#1202528).
   - ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
   - Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
   - Fix releasing of old bundles in xfrm_bundle_lookup() (bsc#1201264
     bsc#1190397 bsc#1199617).
   - KABI: cgroup: Restore KABI of css_set (bsc#1201610).
   - KVM: PPC: Book3S HV: Context tracking exit guest context before enabling
     irqs (bsc#1065729).
   - KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2
     (bsc#1201442)
   - KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (bsc#1120716).
   - KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks
     (git-fixes).
   - KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical
     #GP (git-fixes).
   - PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
   - README, patch-tag-template, header.py: Abolish Novell and FATE
     (bsc#1189904).
   - SUNRPC: Fix READ_PLUS crasher (git-fixes).
   - SUNRPC: Fix the svc_deferred_event trace class (git-fixes).
   - USB: new quirk for Dell Gen 2 devices (git-fixes).
   - USB: serial: io_ti: add Agilent E5805A support (git-fixes).
   - ata: libata: add qc->flags in ata_qc_complete_template tracepoint
     (git-fixes).
   - bs-upload-kernel: Workaround for vim syntax highlighting
   - bs-upload-kernel: build klp_symbols when supported. cherry-picked from
     kbuild
   - btrfs: Convert fs_info->free_chunk_space to atomic64_t (bsc#1202528).
   - btrfs: add a trace class for dumping the current ENOSPC state
     (bsc#1202528).
   - btrfs: add a trace point for reserve tickets (bsc#1202528).
   - btrfs: adjust the flush trace point to include the source (bsc#1202528).
   - btrfs: check reclaim_size in need_preemptive_reclaim (bsc#1202528).
   - btrfs: check worker before need_preemptive_reclaim (bsc#1202528).
   - btrfs: do not do preemptive flushing if the majority is global rsv
     (bsc#1202528).
   - btrfs: do not include the global rsv size in the preemptive used amount
     (bsc#1202528).
   - btrfs: enable a tracepoint when we fail tickets (bsc#1202528).
   - btrfs: handle preemptive delalloc flushing slightly differently
     (bsc#1202528).
   - btrfs: implement space clamping for preemptive flushing (bsc#1202528).
   - btrfs: improve preemptive background space flushing (bsc#1202528).
   - btrfs: include delalloc related info in dump space info tracepoint
     (bsc#1202528).
   - btrfs: introduce a FORCE_COMMIT_TRANS flush operation (bsc#1202528).
   - btrfs: make flush_space take a enum btrfs_flush_state instead of int
     (bsc#1202528).
   - btrfs: only clamp the first time we have to start flushing (bsc#1202528).
   - btrfs: only ignore delalloc if delalloc is much smaller than ordered
     (bsc#1202528).
   - btrfs: reduce the preemptive flushing threshold to 90% (bsc#1202528).
   - btrfs: remove FLUSH_DELAYED_REFS from data ENOSPC flushing (bsc#1202528).
   - btrfs: rename need_do_async_reclaim (bsc#1202528).
   - btrfs: rework btrfs_calc_reclaim_metadata_size (bsc#1202528).
   - btrfs: rip out btrfs_space_info::total_bytes_pinned (bsc#1202528).
   - btrfs: rip out may_commit_transaction (bsc#1202528).
   - btrfs: rip the first_ticket_bytes logic from fail_all_tickets
     (bsc#1202528).
   - btrfs: simplify the logic in need_preemptive_flushing (bsc#1202528).
   - btrfs: take into account global rsv in need_preemptive_reclaim
     (bsc#1202528).
   - btrfs: use delalloc_bytes to determine flush amount for shrink_delalloc
     (bsc#1202528).
   - btrfs: use percpu_read_positive instead of sum_positive for need_preempt
     (bsc#1202528).
   - btrfs: use the filemap_fdatawrite_wbc helper for delalloc shrinking
     (bsc#1202528).
   - btrfs: use the global rsv size in the preemptive thresh calculation
     (bsc#1202528).
   - btrfs: wait on async extents when flushing delalloc (bsc#1202528).
   - btrfs: wake up async_delalloc_pages waiters after submit (bsc#1202528).
   - ceph: do not truncate file in atomic_open (bsc#1202830).
   - cgroup: Use separate src/dst nodes when preloading css_sets for
     migration (bsc#1201610).
   - crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes).
   - crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of
     (git-fixes).
   - cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
   - cxgb4: move handling L2T ARP failures to caller (git-fixes).
   - cxgb4: parse TC-U32 key values and masks natively (git-fixes).
   - dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
   - drivers/perf: arm_spe: Fix consistency of SYS_PMSCR_EL1.CX (git-fixes).
   - fs: add a filemap_fdatawrite_wbc helper (bsc#1202528).
   - fuse: limit nsec (bsc#1203126).
   - iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)
     (git-fixes).
   - ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
   - kabi/severities: add mlx5 internal symbols
   - kernel-obs-build: include qemu_fw_cfg (boo#1201705)
   - lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420
     ZDI-CAN-17325).
   - md-raid: destroy the bitmap after destroying the thread (git-fixes).
   - md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
   - mm/rmap.c: do not reuse anon_vma if we just want a copy (git-fixes,
     bsc#1203098).
   - mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse
     (git-fixes, bsc#1203098).
   - mvpp2: fix panic on module removal (git-fixes).
   - mvpp2: refactor the HW checksum setup (git-fixes).
   - net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
   - net/mlx5: Fix auto group size calculation (git-fixes).
   - net/mlx5: Imply MLXFW in mlx5_core (git-fixes).
   - net/mlx5e: Use the inner headers to determine tc/pedit offload
     limitation on decap flows (git-fixes).
   - net: dsa: mt7530: Change the LINK bit to reflect the link status
     (git-fixes).
   - net: emaclite: Simplify if-else statements (git-fixes).
   - net: ll_temac: Add more error handling of dma_map_single() calls
     (git-fixes).
   - net: ll_temac: Enable DMA when ready, not before (git-fixes).
   - net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure
     (git-fixes).
   - net: ll_temac: Fix iommu/swiotlb leak (git-fixes).
   - net: ll_temac: Fix support for 64-bit platforms (git-fixes).
   - net: ll_temac: Fix support for little-endian platforms (git-fixes).
   - net: ll_temac: Fix typo bug for 32-bit (git-fixes).
   - net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale
     pointer (git-fixes).
   - net: stmmac: gmac4: bitrev32 returns u32 (git-fixes).
   - net: usb: lan78xx: Connect PHY before registering MAC (git-fixes).
   - net: xilinx: replace dev_kfree_skb_irq by dev_consume_skb_irq for drop
     profiles (git-fixes).
   - net_sched: cls_route: disallow handle of 0 (bsc#1202393).
   - objtool: Add --backtrace support (bsc#1202396).
   - objtool: Add support for intra-function calls (bsc#1202396).
   - objtool: Allow no-op CFI ops in alternatives (bsc#1202396).
   - objtool: Convert insn type to enum (bsc#1202396).
   - objtool: Do not use ignore flag for fake jumps (bsc#1202396).
   - objtool: Fix !CFI insn_state propagation (bsc#1202396).
   - objtool: Fix ORC vs alternatives (bsc#1202396).
   - objtool: Fix sibling call detection (bsc#1202396).
   - objtool: Make handle_insn_ops() unconditional (bsc#1202396).
   - objtool: Remove INSN_STACK (bsc#1202396).
   - objtool: Remove check preventing branches within alternative
     (bsc#1202396).
   - objtool: Rename elf_open() to prevent conflict with libelf from
     elftoolchain (bsc#1202396).
   - objtool: Rename struct cfi_state (bsc#1202396).
   - objtool: Rework allocating stack_ops on decode (bsc#1202396).
   - objtool: Rewrite alt->skip_orig (bsc#1202396).
   - objtool: Set insn->func for alternatives (bsc#1202396).
   - objtool: Support conditional retpolines (bsc#1202396).
   - objtool: Support multiple stack_op per instruction (bsc#1202396).
   - objtool: Track original function across branches (bsc#1202396).
   - objtool: Uniquely identify alternative instruction groups (bsc#1202396).
   - objtool: Use Elf_Scn typedef instead of assuming struct name
     (bsc#1202396).
   - pNFS: Do not keep retrying if the server replied
     NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
   - phy: tegra: fix device-tree node lookups (git-fixes).
   - powerpc/perf: Add privileged access check for thread_imc (bsc#1054914,
     git-fixes).
   - powerpc/perf: Fix loop exit condition in nest_imc_event_init
     (bsc#1054914, git-fixes).
   - powerpc/perf: Return accordingly on invalid chip-id in (bsc#1054914,
     git-fixes).
   - powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
   - powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
   - powerpc/powernv: Staticify functions without prototypes (bsc#1065729).
   - powerpc/powernv: Use darn instruction for get_random_seed() on Power9
     (bsc#1065729).
   - powerpc/powernv: delay rng platform device creation until later in boot
     (bsc#1065729).
   - powerpc/powernv: rename remaining rng powernv_ functions to pnv_
     (bsc#1065729).
   - powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
   - powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
   - powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
   - powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
   - powerpc: Use sizeof(*foo) rather than sizeof(struct foo) (bsc#1054914,
     git-fixes).
   - powerpc: define get_cycles macro for arch-override (bsc#1065729).
   - powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
   - qed: Add EDPM mode type for user-fw compatibility (git-fixes).
   - qed: fix kABI in qed_rdma_create_qp_in_params (git-fixes).
   - run_oldconfig.sh: Only use dummy tools if they exist (bcs#1181862).
   - scripts/run_oldconfig.sh: Make dumy-tools executable (bcs#1181862).
   - scripts/run_oldconfig.sh: make use of scripts/dummy-tools (bcs#1181862).
   - scripts/run_oldconfig.sh: use pahole from dummy-tools if available
     (bsc#1198388).
   - scsi: smartpqi: set force_blk_mq=1.(bsc#1179310)
   - sequence-patch: just exist if there is no config.sh
   - spmi: trace: fix stack-out-of-bound access in SPMI tracing functions
     (git-fixes).
   - squashfs: add more sanity checks in id lookup (git-fixes).
   - squashfs: add more sanity checks in inode lookup (git-fixes).
   - squashfs: add more sanity checks in xattr id lookup (git-fixes).
   - squashfs: fix divide error in calculate_skip() (git-fixes).
   - squashfs: fix inode lookup sanity checks (bsc#1203013).
   - squashfs: fix xattr id and id lookup sanity checks (bsc#1203013).
   - tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing
     (git-fixes).
   - tracing/perf: Use strndup_user() instead of buggy open-coded version
     (git-fixes).
   - tracing/uprobes: Check the return value of kstrdup() for tu->filename
     (git-fixes).
   - tracing: Fix race in perf_trace_buf initialization (git-fixes).
   - usb: misc: fix improper handling of refcount in uss720_probe()
     (git-fixes).
   - usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
   - usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
   - xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
   - xfs: always free inline data before resetting inode fork during ifree
     (bsc#1202017).
   - xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).
   - xfs: fix NULL pointer dereference in xfs_getbmap() (git-fixes).
   - xprtrdma: Fix trace point use-after-free race (git-fixes).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP5:

      zypper in -t patch SUSE-SLE-WE-12-SP5-2022-3265=1

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-3265=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3265=1

   - SUSE Linux Enterprise Live Patching 12-SP5:

      zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2022-3265=1

      Please note that this is the initial kernel livepatch without fixes
      itself, this livepatch package is later updated by seperate standalone
      livepatch updates.

   - SUSE Linux Enterprise High Availability 12-SP5:

      zypper in -t patch SUSE-SLE-HA-12-SP5-2022-3265=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64):

      kernel-default-debuginfo-4.12.14-122.133.1
      kernel-default-debugsource-4.12.14-122.133.1
      kernel-default-extra-4.12.14-122.133.1
      kernel-default-extra-debuginfo-4.12.14-122.133.1

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):

      kernel-obs-build-4.12.14-122.133.1
      kernel-obs-build-debugsource-4.12.14-122.133.1

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (noarch):

      kernel-docs-4.12.14-122.133.2

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      kernel-default-4.12.14-122.133.1
      kernel-default-base-4.12.14-122.133.1
      kernel-default-base-debuginfo-4.12.14-122.133.1
      kernel-default-debuginfo-4.12.14-122.133.1
      kernel-default-debugsource-4.12.14-122.133.1
      kernel-default-devel-4.12.14-122.133.1
      kernel-syms-4.12.14-122.133.1

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      kernel-devel-4.12.14-122.133.1
      kernel-macros-4.12.14-122.133.1
      kernel-source-4.12.14-122.133.1

   - SUSE Linux Enterprise Server 12-SP5 (x86_64):

      kernel-default-devel-debuginfo-4.12.14-122.133.1

   - SUSE Linux Enterprise Server 12-SP5 (s390x):

      kernel-default-man-4.12.14-122.133.1

   - SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):

      kernel-default-debuginfo-4.12.14-122.133.1
      kernel-default-debugsource-4.12.14-122.133.1
      kernel-default-kgraft-4.12.14-122.133.1
      kernel-default-kgraft-devel-4.12.14-122.133.1
      kgraft-patch-4_12_14-122_133-default-1-8.3.1

   - SUSE Linux Enterprise High Availability 12-SP5 (ppc64le s390x x86_64):

      cluster-md-kmp-default-4.12.14-122.133.1
      cluster-md-kmp-default-debuginfo-4.12.14-122.133.1
      dlm-kmp-default-4.12.14-122.133.1
      dlm-kmp-default-debuginfo-4.12.14-122.133.1
      gfs2-kmp-default-4.12.14-122.133.1
      gfs2-kmp-default-debuginfo-4.12.14-122.133.1
      kernel-default-debuginfo-4.12.14-122.133.1
      kernel-default-debugsource-4.12.14-122.133.1
      ocfs2-kmp-default-4.12.14-122.133.1
      ocfs2-kmp-default-debuginfo-4.12.14-122.133.1


References:

   https://www.suse.com/security/cve/CVE-2020-36516.html
   https://www.suse.com/security/cve/CVE-2021-4203.html
   https://www.suse.com/security/cve/CVE-2022-20368.html
   https://www.suse.com/security/cve/CVE-2022-20369.html
   https://www.suse.com/security/cve/CVE-2022-21385.html
   https://www.suse.com/security/cve/CVE-2022-2588.html
   https://www.suse.com/security/cve/CVE-2022-26373.html
   https://www.suse.com/security/cve/CVE-2022-2639.html
   https://www.suse.com/security/cve/CVE-2022-29581.html
   https://www.suse.com/security/cve/CVE-2022-2977.html
   https://www.suse.com/security/cve/CVE-2022-3028.html
   https://www.suse.com/security/cve/CVE-2022-36879.html
   https://bugzilla.suse.com/1054914
   https://bugzilla.suse.com/1065729
   https://bugzilla.suse.com/1078216
   https://bugzilla.suse.com/1093777
   https://bugzilla.suse.com/1094120
   https://bugzilla.suse.com/1107937
   https://bugzilla.suse.com/1120716
   https://bugzilla.suse.com/1141488
   https://bugzilla.suse.com/1179310
   https://bugzilla.suse.com/1181862
   https://bugzilla.suse.com/1189904
   https://bugzilla.suse.com/1190397
   https://bugzilla.suse.com/1191881
   https://bugzilla.suse.com/1194535
   https://bugzilla.suse.com/1196616
   https://bugzilla.suse.com/1197158
   https://bugzilla.suse.com/1198388
   https://bugzilla.suse.com/1199617
   https://bugzilla.suse.com/1199665
   https://bugzilla.suse.com/1201019
   https://bugzilla.suse.com/1201264
   https://bugzilla.suse.com/1201420
   https://bugzilla.suse.com/1201442
   https://bugzilla.suse.com/1201610
   https://bugzilla.suse.com/1201705
   https://bugzilla.suse.com/1201726
   https://bugzilla.suse.com/1201948
   https://bugzilla.suse.com/1202017
   https://bugzilla.suse.com/1202096
   https://bugzilla.suse.com/1202154
   https://bugzilla.suse.com/1202346
   https://bugzilla.suse.com/1202347
   https://bugzilla.suse.com/1202393
   https://bugzilla.suse.com/1202396
   https://bugzilla.suse.com/1202528
   https://bugzilla.suse.com/1202577
   https://bugzilla.suse.com/1202672
   https://bugzilla.suse.com/1202830
   https://bugzilla.suse.com/1202897
   https://bugzilla.suse.com/1202898
   https://bugzilla.suse.com/1203013
   https://bugzilla.suse.com/1203098
   https://bugzilla.suse.com/1203126



More information about the sle-security-updates mailing list