File _patchinfo of Package patchinfo.26291
<patchinfo incident="26291">
<issue id="1202677" tracker="bnc">VUL-0: CVE-2022-2503: kernel-source-rt,kernel-source,kernel-source-azure: LoadPin bypass via dm-verity table reload</issue>
<issue id="1202960" tracker="bnc">VUL-0: CVE-2022-41218: kernel: vmalloc use-after-free in dvb-core/dmxdev</issue>
<issue id="1203552" tracker="bnc">VUL-0: CVE-2022-3239: kernel: em28xx initialize refcount before kref_get</issue>
<issue id="1203769" tracker="bnc">VUL-0: CVE-2022-3303: kernel: race condition in snd_pcm_oss_sync leads to NULL pointer dereference</issue>
<issue id="2022-3303" tracker="cve" />
<issue id="2022-41218" tracker="cve" />
<issue id="2022-3239" tracker="cve" />
<issue id="2022-2503" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>osalvador</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 12-SP2 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).
- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).
The following non-security bugs were fixed:
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>