File _patchinfo of Package patchinfo.20459
<patchinfo incident="20459">
<issue id="1152489" tracker="bnc">[TRACKERBUG] git-fixes pile for SLE15-SP2</issue>
<issue id="1182470" tracker="bnc">SLES 15 SP3 - FC SANboot servers enter read-only mode during array upgrade</issue>
<issue id="1185486" tracker="bnc">after 30 times of flap cable pull on switch, NVMe LUNs lost one of the paths unless the host being rebooted</issue>
<issue id="1187927" tracker="bnc">ceph: must hold snap_rwsem when filling inode for async create</issue>
<issue id="1187972" tracker="bnc">cgroup1: don't allow '\n' in renaming</issue>
<issue id="1187980" tracker="bnc">scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM</issue>
<issue id="1188062" tracker="bnc">VUL-0: EMBARGOED: CVE-2021-33909: kernel-source: size_t-to-int vulnerability in Linux's filesystem layer</issue>
<issue id="1188116" tracker="bnc">VUL-0: CVE-2021-22555: kernel-source-azure,kernel-source-rt,kernel-source: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c</issue>
<issue id="2021-22555" tracker="cve" />
<issue id="2021-33909" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>olh</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-22555: A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c (bnc#1188116 ).
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges (bsc#1188062).
The following non-security bugs were fixed:
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current->mm for kernel threads (bsc#1152489).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>