

- Usb block 1.7.1 registration code update#
- Usb block 1.7.1 registration code driver#
- Usb block 1.7.1 registration code free#
CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604). CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482). CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
Usb block 1.7.1 registration code driver#
CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487). CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050). CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171). CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
Usb block 1.7.1 registration code update#
This update has been retracted, as it has caused regressions on multiple machines types. The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. Summary: Security update for the Linux Kernel This readds the s390 32bit glibc and libcrypt1 libraries (glibc-32bit, glibc-locale-base-32bit, libcrypt1-32bit). rtld: Avoid using up static TLS surplus for optimizations (bsc#1200855, BZ #25051)

i386: Remove broken CAN_USE_REGISTER_ASM_EBP (bsc#1197718) Disable warnings due to deprecated libselinux symbols used by nss and nscd (bsc#1197718) powerpc: Fix VSX register number on _strncpy_power9 (bsc#1200334) This update for glibc fixes the following issues:

CVE-2020-29362: Fixed a 4 byte overread in p11_rpc_buffer_get_byte_array which could lead to crashes (bsc#1180065) This update for p11-kit fixes the following issues: CVE-2022-29217: Fixed key confusion through non-blocklisted public key format (bsc#1199756). This update for python-PyJWT fixes the following issues: Summary: Security update for python-PyJWT

CVE-2022-1586: Fixed unicode property matching issue. This update for pcre fixes the following issues: CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511). This update for python3 fixes the following issues: The following patches have been included in this update:
