SUSE-SU-2023:0591-1: important: Security update for the Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Mar 2 12:31:44 UTC 2023



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2023:0591-1  
Rating: important  
References:

  * #1065729
  * #1156395
  * #1203740
  * #1204614
  * #1204989
  * #1205496
  * #1205601
  * #1205695
  * #1206073
  * #1206344
  * #1206393
  * #1206399
  * #1206515
  * #1206602
  * #1206634
  * #1206635
  * #1206636
  * #1206637
  * #1206640
  * #1206641
  * #1206642
  * #1206643
  * #1206644
  * #1206645
  * #1206646
  * #1206647
  * #1206648
  * #1206649
  * #1206841
  * #1206854
  * #1206855
  * #1206857
  * #1206858
  * #1206859
  * #1206860
  * #1206873
  * #1206875
  * #1206876
  * #1206877
  * #1206878
  * #1206880
  * #1206881
  * #1206882
  * #1206883
  * #1206884
  * #1206885
  * #1206886
  * #1206887
  * #1206888
  * #1206889
  * #1206890
  * #1206891
  * #1206893
  * #1206896
  * #1206904
  * #1207036
  * #1207125

  
Cross-References:

  * CVE-2022-3112
  * CVE-2022-3115
  * CVE-2022-3564
  * CVE-2022-47520
  * CVE-2023-23454
  * CVE-2023-23455

  
CVSS scores:

  * CVE-2022-3112 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-3112 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-3115 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-3115 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-3564 ( SUSE ):  8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-3564 ( NVD ):  5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2022-47520 ( SUSE ):  8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L
  * CVE-2022-47520 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-23454 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-23454 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-23455 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-23455 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise Micro 5.1
  * SUSE Linux Enterprise Micro 5.2
  * SUSE Linux Enterprise Micro for Rancher 5.2
  * SUSE Linux Enterprise Real Time 15 SP3
  * SUSE Real Time Module 15-SP3

  
  
An update that solves six vulnerabilities, contains two features and has 51
fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  * CVE-2022-3112: Fixed a null pointer dereference caused by lacks check of the
    return value of kzalloc() in vdec_helpers.c:amvdec_set_canvases
    (bsc#1206399).
  * CVE-2022-3115: Fixed a null pointer dereference in malidp_crtc.c caused by a
    lack of checks of the return value of kzalloc (bsc#1206393).
  * CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth
    component (bsc#1206073).
  * CVE-2022-47520: Fixed a out-of-bounds read when parsing a Robust Security
    Network (RSN) information element from a Netlink packet in the WILC1000
    wireless driver (bsc#1206515).
  * CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler
    (bsc#1207036).
  * CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in
    net/sched/sch_atm.c because of type confusion (bsc#1207125).

The following non-security bugs were fixed:

  * arm64: cpu_errata: Add Hisilicon TSV110 to spectre-v2 safe list (git-fixes)
  * arm64: dts: allwinner: H5: Add PMU node (git-fixes)
  * arm64: dts: allwinner: H6: Add PMU mode (git-fixes)
  * arm64: dts: marvell: Add AP806-dual missing CPU clocks (git-fixes)
  * arm64: dts: rockchip: Fix NanoPC-T4 cooling maps (git-fixes)
  * arm64: dts: rockchip: add reg property to brcmf sub-nodes (git-fixes)
  * arm64: dts: rockchip: fix dwmmc clock name for px30 (git-fixes)
  * arm64: memory: Add missing brackets to untagged_addr() macro (git-fixes)
  * arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes).
  * arm64: tags: Preserve tags for addresses translated via TTBR1 (git-fixes)
  * arm64: tegra: Fix 'active-low' warning for Jetson Xavier regulator (git-
    fixes)
  * btrfs: Avoid unnecessary lock and leaf splits when up (bsc#1206904).
  * drbd: destroy workqueue when drbd device was freed (git-fixes).
  * drbd: remove usage of list iterator variable after loop (git-fixes).
  * drbd: use after free in drbd_create_device() (git-fixes).
  * ext4: Detect already used quota file early (bsc#1206873).
  * ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
  * ext4: avoid BUG_ON when creating xattrs (bsc#1205496).
  * ext4: avoid crash when inline data creation follows DIO write (bsc#1206883).
  * ext4: avoid race conditions when remounting with options that change dax
    (bsc#1206860).
  * ext4: avoid resizing to a partial cluster size (bsc#1206880).
  * ext4: choose hardlimit when softlimit is larger than hardlimit in
    ext4_statfs_project() (bsc#1206854).
  * ext4: continue to expand file system when the target size does not reach
    (bsc#1206882).
  * ext4: convert BUG_ON's to WARN_ON's in mballoc.c (bsc#1206859).
  * ext4: correct max_inline_xattr_value_size computing (bsc#1206878).
  * ext4: correct the error path of ext4_write_inline_data_end() (bsc#1206875).
  * ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878).
  * ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886).
  * ext4: fix a data race at inode->i_disksize (bsc#1206855).
  * ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0
    (bsc#1206881).
  * ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).
  * ext4: fix extent status tree race in writeback error recovery path
    (bsc#1206877).
  * ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884).
  * ext4: fix undefined behavior in bit shift for ext4_check_flag_values
    (bsc#1206890).
  * ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893).
  * ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888).
  * ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878).
  * ext4: fix warning in 'ext4_da_release_space' (bsc#1206887).
  * ext4: iomap that extends beyond EOF should be marked dirty (bsc#1206637).
  * ext4: make ext4_lazyinit_thread freezable (bsc#1206885).
  * ext4: mark block bitmap corrupted when found instead of BUGON (bsc#1206857).
  * ext4: silence the warning when evicting inode with dioread_nolock
    (bsc#1206889).
  * ext4: update s_overhead_clusters in the superblock during an on-line resize
    (bsc#1206876).
  * ext4: use matching invalidatepage in ext4_writepage (bsc#1206858).
  * fs: nfsd: fix kconfig dependency warning for NFSD_V4 (git-fixes).
  * ibmveth: Always stop tx queues during close (bsc#1065729).
  * isofs: joliet: Fix iocharset=utf8 mount option (bsc#1206636).
  * lib/notifier-error-inject: fix error when writing -errno to debugfs file
    (bsc#1206634).
  * libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (bsc#1206634).
  * lockd: lockd server-side shouldn't set fl_ops (git-fixes).
  * memcg, kmem: further deprecate kmem.limit_in_bytes (bsc#1206896).
  * memcg: Fix possible use-after-free in memcg_write_event_control()
    (bsc#1206344).
  * mm, memcg: do not high throttle allocators based on wraparound
  * mm, memcg: fix corruption on 64-bit divisor in memory.high throttling
  * mm, memcg: throttle allocators based on ancestral memory.high
  * mm/filemap.c: clear page error before actual read (bsc#1206635).
  * mm: fix race between MADV_FREE reclaim and blkdev direct IO read
    (bsc#1204989,bsc#1205601).
  * module: Remove accidental change of module_enable_x() (git-fixes).
  * module: avoid _goto_ s in module_sig_check() (git-fixes).
  * module: merge repetitive strings in module_sig_check() (git-fixes).
  * module: set MODULE_STATE_GOING state when a module fails to load (git-
    fixes).
  * modules: lockdep: Suppress suspicious RCU usage warning (git-fixes).
  * net: sched: atm: dont intepret cls results when asked to drop (bsc#1207036).
  * net: sched: cbq: dont intepret cls results when asked to drop (bsc#1207036).
  * net: sunrpc: Fix off-by-one issues in 'rpc_ntop6' (git-fixes).
  * netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()
    (bsc#1204614).
  * nfs4: Fix kmemleak when allocate slot failed (git-fixes).
  * nfs4: Fix oops when copy_file_range is attempted with NFS4.0 source (git-
    fixes).
  * nfs: Fix an Oops in nfs_d_automount() (git-fixes).
  * nfs: Fix memory leaks (git-fixes).
  * nfs: Fix memory leaks in nfs_pageio_stop_mirroring() (git-fixes).
  * nfs: Handle missing attributes in OPEN reply (bsc#1203740).
  * nfs: Zero-stateid SETATTR should first return delegation (git-fixes).
  * nfs: direct.c: Fix memory leak of dreq when nfs_get_lock_context fails (git-
    fixes).
  * nfs: fix PNFS_FLEXFILE_LAYOUT Kconfig default (git-fixes).
  * nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).
  * nfs: nfs_find_open_context() may only select open files (git-fixes).
  * nfs: nfs_xdr_status should record the procedure name (git-fixes).
  * nfs: we do not support removing system.nfs4_acl (git-fixes).
  * nfsd: Clone should commit src file metadata too (git-fixes).
  * nfsd: Fix handling of oversized NFSv4 COMPOUND requests (git-fixes).
  * nfsd: Fix svc_xprt refcnt leak when setup callback client failed (git-
    fixes).
  * nfsd: Keep existing listeners on portlist error (git-fixes).
  * nfsd: Return nfserr_serverfault if splice_ok but buf->pages have data (git-
    fixes).
  * nfsd: do not call nfsd_file_put from client states seqfile display (git-
    fixes).
  * nfsd: fix error handling in NFSv4.0 callbacks (git-fixes).
  * nfsd: safer handling of corrupted c_type (git-fixes).
  * nfsv4 expose nfs_parse_server_name function (git-fixes).
  * nfsv4 only print the label when its queried (git-fixes).
  * nfsv4 remove zero number of fs_locations entries error check (git-fixes).
  * nfsv4.1 handle ERR_DELAY error reclaiming locking state on delegation recall
    (git-fixes).
  * nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).
  * nfsv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes).
  * nfsv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes).
  * nfsv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes).
  * nfsv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes).
  * nfsv4.2: Fix initialisation of struct nfs4_label (git-fixes).
  * nfsv4.2: Fixup CLONE dest file size for zero-length count (git-fixes).
  * nfsv4.2: error out when relink swapfile (git-fixes).
  * nfsv4.x: Fail client initialisation if state manager thread can't run (git-
    fixes).
  * nfsv4/pnfs: Always return layout stats on layout return for flexfiles (git-
    fixes).
  * nfsv4/pnfs: Fix a use-after-free bug in open (git-fixes).
  * nfsv4: Do not hold the layoutget locks across multiple RPC calls (git-
    fixes).
  * nfsv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn
    (git-fixes).
  * nfsv4: Fix a pNFS layout related use-after-free race when freeing the inode
    (git-fixes).
  * nfsv4: Fix races between open and dentry revalidation (git-fixes).
  * nfsv4: Protect the state recovery thread against direct reclaim (git-fixes).
  * nfsv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes).
  * pnfs/nfsv4: Try to return invalid layout in pnfs_layout_process() (git-
    fixes).
  * powerpc/64: Init jump labels before parse_early_param() (bsc#1065729).
  * powerpc/64s/pgtable: fix an undefined behaviour (bsc#1065729).
  * powerpc/book3s/mm: Update Oops message to print the correct translation in
    use (bsc#1156395).
  * powerpc/boot: Fixup device-tree on little endian (bsc#1065729).
  * powerpc/crashkernel: Take "mem=" option into account (bsc#1065729).
  * powerpc/eeh: Only dump stack once if an MMIO loop is detected (bsc#1065729).
  * powerpc/pci: Fix get_phb_number() locking (bsc#1065729).
  * powerpc/perf: callchain validate kernel stack pointer bounds (bsc#1065729).
  * powerpc/powernv/iov: Ensure the pdn for VFs always contains a valid PE
    number (bsc#1065729).
  * powerpc/powernv/smp: Fix spurious DBG() warning (bsc#1065729).
  * powerpc/powernv: Avoid re-registration of imc debugfs directory
    (bsc#1156395).
  * powerpc/powernv: add missing of_node_put (bsc#1065729).
  * powerpc/pseries/cmm: Implement release() function for sysfs device
    (bsc#1065729).
  * powerpc/pseries/eeh: use correct API for error log size (bsc#1065729).
  * powerpc/pseries: Stop calling printk in rtas_stop_self() (bsc#1065729).
  * powerpc/pseries: unregister VPA when hot unplugging a CPU (bsc#1205695
    ltc#200603).
  * powerpc/rtas: avoid device tree lookups in rtas_os_term() (bsc#1065729).
  * powerpc/rtas: avoid scheduling in rtas_os_term() (bsc#1065729).
  * powerpc/sriov: Remove VF eeh_dev state when disabling SR-IOV (bsc#1065729).
  * powerpc/xive/spapr: correct bitmap allocation size (git-fixes).
  * powerpc/xive: Add a check for memory allocation failure (git-fixes).
  * powerpc/xive: add missing iounmap() in error path in
    xive_spapr_populate_irq_data() (git-fixes).
  * powerpc: Ensure that swiotlb buffer is allocated from low memory
    (bsc#1156395).
  * powerpc: Force inlining of cpu_has_feature() to avoid build failure
    (bsc#1065729).
  * powerpc: improve handling of unrecoverable system reset (bsc#1065729).
  * powerpc: sysdev: add missing iounmap() on error in mpic_msgr_probe()
    (bsc#1065729).
  * quota: Check next/prev free block number after reading from quota file
    (bsc#1206640).
  * rpc: fix NULL dereference on kmalloc failure (git-fixes).
  * rpc: fix gss_svc_init cleanup on failure (git-fixes).
  * sbitmap: fix lockup while swapping (bsc#1206602).
  * sched/psi: Fix sampling error and rare div0 crashes with cgroups and high
    uptime (bsc#1206841).
  * scsi: lpfc: Correct bandwidth logging during receipt of congestion sync WCQE
    (jsc#PED-1445).
  * scsi: lpfc: Fix MI capability display in cmf_info sysfs attribute
    (jsc#PED-1445).
  * scsi: lpfc: Fix WQ|CQ|EQ resource check (jsc#PED-1445).
  * scsi: lpfc: Fix crash involving race between FLOGI timeout and devloss
    handler (jsc#PED-1445).
  * scsi: lpfc: Remove linux/msi.h include (jsc#PED-1445).
  * scsi: lpfc: Remove redundant pointer 'lp' (jsc#PED-1445).
  * scsi: lpfc: Update lpfc version to 14.2.0.9 (jsc#PED-1445).
  * scsi: lpfc: Use memset_startat() helper (jsc#PED-1445).
  * scsi: qla2xxx: Fix crash when I/O abort times out (jsc#PED-568).
  * scsi: qla2xxx: Fix set-but-not-used variable warnings (jsc#PED-568).
  * scsi: qla2xxx: Initialize vha->unknown_atio_[list, work] for NPIV hosts
    (jsc#PED-568).
  * scsi: qla2xxx: Remove duplicate of vha->iocb_work initialization
    (jsc#PED-568).
  * scsi: qla2xxx: Remove unused variable 'found_devs' (jsc#PED-568).
  * string.h: Introduce memset_startat() for wiping trailing members and padding
    (jsc#PED-1445).
  * sunrpc: Do not leak netobj memory when gss_read_proxy_verf() fails (git-
    fixes).
  * sunrpc: Do not start a timer on an already queued rpc task (git-fixes).
  * sunrpc: Fix missing release socket in rpc_sockname() (git-fixes).
  * sunrpc: Fix potential leaks in sunrpc_cache_unhash() (git-fixes).
  * sunrpc: Fix socket waits for write buffer space (git-fixes).
  * sunrpc: Handle 0 length opaque XDR object data properly (git-fixes).
  * sunrpc: Mitigate cond_resched() in xprt_transmit() (git-fixes).
  * sunrpc: Move simple_get_bytes and simple_get_netobj into private header
    (git-fixes).
  * sunrpc: check that domain table is empty at module unload (git-fixes).
  * sunrpc: stop printk reading past end of string (git-fixes).
  * svcrdma: Fix another Receive buffer leak (git-fixes).
  * svcrdma: Fix backchannel return code (git-fixes).
  * tracing: Verify if trace array exists before destroying it (git-fixes).
  * udf: Avoid accessing uninitialized data on failed inode read (bsc#1206642).
  * udf: Fix NULL pointer dereference in udf_symlink function (bsc#1206646).
  * udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).
  * udf: Fix free space reporting for metadata and virtual partitions
    (bsc#1206641).
  * udf: Fix iocharset=utf8 mount option (bsc#1206647).
  * udf: Limit sparing table size (bsc#1206643).
  * udf: fix silent AED tagLocation corruption (bsc#1206645).
  * udf: fix the problem that the disc content is not displayed (bsc#1206644).
  * udf_get_extendedattr() had no boundary checks (bsc#1206648).
  * xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).
  * xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Real Time Module 15-SP3  
    zypper in -t patch SUSE-SLE-Module-RT-15-SP3-2023-591=1

  * SUSE Linux Enterprise Micro 5.1  
    zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-591=1

  * SUSE Linux Enterprise Micro 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-591=1

  * SUSE Linux Enterprise Micro for Rancher 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-591=1

## Package List:

  * SUSE Real Time Module 15-SP3 (x86_64)
    * kernel-syms-rt-5.3.18-150300.118.1
    * kernel-rt_debug-devel-debuginfo-5.3.18-150300.118.1
    * cluster-md-kmp-rt-5.3.18-150300.118.1
    * kernel-rt_debug-debugsource-5.3.18-150300.118.1
    * gfs2-kmp-rt-debuginfo-5.3.18-150300.118.1
    * kernel-rt-debuginfo-5.3.18-150300.118.1
    * dlm-kmp-rt-debuginfo-5.3.18-150300.118.1
    * dlm-kmp-rt-5.3.18-150300.118.1
    * kernel-rt-devel-debuginfo-5.3.18-150300.118.1
    * kernel-rt_debug-devel-5.3.18-150300.118.1
    * gfs2-kmp-rt-5.3.18-150300.118.1
    * cluster-md-kmp-rt-debuginfo-5.3.18-150300.118.1
    * kernel-rt-debugsource-5.3.18-150300.118.1
    * ocfs2-kmp-rt-5.3.18-150300.118.1
    * kernel-rt_debug-debuginfo-5.3.18-150300.118.1
    * ocfs2-kmp-rt-debuginfo-5.3.18-150300.118.1
    * kernel-rt-devel-5.3.18-150300.118.1
  * SUSE Real Time Module 15-SP3 (noarch)
    * kernel-devel-rt-5.3.18-150300.118.1
    * kernel-source-rt-5.3.18-150300.118.1
  * SUSE Real Time Module 15-SP3 (nosrc x86_64)
    * kernel-rt-5.3.18-150300.118.1
  * SUSE Real Time Module 15-SP3 (nosrc)
    * kernel-rt_debug-5.3.18-150300.118.1
  * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64)
    * kernel-rt-5.3.18-150300.118.1
  * SUSE Linux Enterprise Micro 5.1 (x86_64)
    * kernel-rt-debuginfo-5.3.18-150300.118.1
    * kernel-rt-debugsource-5.3.18-150300.118.1
  * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
    * kernel-rt-5.3.18-150300.118.1
  * SUSE Linux Enterprise Micro 5.2 (x86_64)
    * kernel-rt-debuginfo-5.3.18-150300.118.1
    * kernel-rt-debugsource-5.3.18-150300.118.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
    * kernel-rt-5.3.18-150300.118.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
    * kernel-rt-debuginfo-5.3.18-150300.118.1
    * kernel-rt-debugsource-5.3.18-150300.118.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-3112.html
  * https://www.suse.com/security/cve/CVE-2022-3115.html
  * https://www.suse.com/security/cve/CVE-2022-3564.html
  * https://www.suse.com/security/cve/CVE-2022-47520.html
  * https://www.suse.com/security/cve/CVE-2023-23454.html
  * https://www.suse.com/security/cve/CVE-2023-23455.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1156395
  * https://bugzilla.suse.com/show_bug.cgi?id=1203740
  * https://bugzilla.suse.com/show_bug.cgi?id=1204614
  * https://bugzilla.suse.com/show_bug.cgi?id=1204989
  * https://bugzilla.suse.com/show_bug.cgi?id=1205496
  * https://bugzilla.suse.com/show_bug.cgi?id=1205601
  * https://bugzilla.suse.com/show_bug.cgi?id=1205695
  * https://bugzilla.suse.com/show_bug.cgi?id=1206073
  * https://bugzilla.suse.com/show_bug.cgi?id=1206344
  * https://bugzilla.suse.com/show_bug.cgi?id=1206393
  * https://bugzilla.suse.com/show_bug.cgi?id=1206399
  * https://bugzilla.suse.com/show_bug.cgi?id=1206515
  * https://bugzilla.suse.com/show_bug.cgi?id=1206602
  * https://bugzilla.suse.com/show_bug.cgi?id=1206634
  * https://bugzilla.suse.com/show_bug.cgi?id=1206635
  * https://bugzilla.suse.com/show_bug.cgi?id=1206636
  * https://bugzilla.suse.com/show_bug.cgi?id=1206637
  * https://bugzilla.suse.com/show_bug.cgi?id=1206640
  * https://bugzilla.suse.com/show_bug.cgi?id=1206641
  * https://bugzilla.suse.com/show_bug.cgi?id=1206642
  * https://bugzilla.suse.com/show_bug.cgi?id=1206643
  * https://bugzilla.suse.com/show_bug.cgi?id=1206644
  * https://bugzilla.suse.com/show_bug.cgi?id=1206645
  * https://bugzilla.suse.com/show_bug.cgi?id=1206646
  * https://bugzilla.suse.com/show_bug.cgi?id=1206647
  * https://bugzilla.suse.com/show_bug.cgi?id=1206648
  * https://bugzilla.suse.com/show_bug.cgi?id=1206649
  * https://bugzilla.suse.com/show_bug.cgi?id=1206841
  * https://bugzilla.suse.com/show_bug.cgi?id=1206854
  * https://bugzilla.suse.com/show_bug.cgi?id=1206855
  * https://bugzilla.suse.com/show_bug.cgi?id=1206857
  * https://bugzilla.suse.com/show_bug.cgi?id=1206858
  * https://bugzilla.suse.com/show_bug.cgi?id=1206859
  * https://bugzilla.suse.com/show_bug.cgi?id=1206860
  * https://bugzilla.suse.com/show_bug.cgi?id=1206873
  * https://bugzilla.suse.com/show_bug.cgi?id=1206875
  * https://bugzilla.suse.com/show_bug.cgi?id=1206876
  * https://bugzilla.suse.com/show_bug.cgi?id=1206877
  * https://bugzilla.suse.com/show_bug.cgi?id=1206878
  * https://bugzilla.suse.com/show_bug.cgi?id=1206880
  * https://bugzilla.suse.com/show_bug.cgi?id=1206881
  * https://bugzilla.suse.com/show_bug.cgi?id=1206882
  * https://bugzilla.suse.com/show_bug.cgi?id=1206883
  * https://bugzilla.suse.com/show_bug.cgi?id=1206884
  * https://bugzilla.suse.com/show_bug.cgi?id=1206885
  * https://bugzilla.suse.com/show_bug.cgi?id=1206886
  * https://bugzilla.suse.com/show_bug.cgi?id=1206887
  * https://bugzilla.suse.com/show_bug.cgi?id=1206888
  * https://bugzilla.suse.com/show_bug.cgi?id=1206889
  * https://bugzilla.suse.com/show_bug.cgi?id=1206890
  * https://bugzilla.suse.com/show_bug.cgi?id=1206891
  * https://bugzilla.suse.com/show_bug.cgi?id=1206893
  * https://bugzilla.suse.com/show_bug.cgi?id=1206896
  * https://bugzilla.suse.com/show_bug.cgi?id=1206904
  * https://bugzilla.suse.com/show_bug.cgi?id=1207036
  * https://bugzilla.suse.com/show_bug.cgi?id=1207125
  * https://jira.suse.com/browse/PED-1445
  * https://jira.suse.com/browse/PED-568

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20230302/0eca727e/attachment.htm>


More information about the sle-security-updates mailing list