diff --git a/patches.suse/KVM-s390-vsie-fix-race-during-shadow-creation.patch b/patches.suse/KVM-s390-vsie-fix-race-during-shadow-creation.patch index 23804a6..f154ff7 100644 --- a/patches.suse/KVM-s390-vsie-fix-race-during-shadow-creation.patch +++ b/patches.suse/KVM-s390-vsie-fix-race-during-shadow-creation.patch @@ -3,7 +3,7 @@ Date: Wed, 20 Dec 2023 13:53:17 +0100 Subject: KVM: s390: vsie: fix race during shadow creation Git-commit: fe752331d4b361d43cfd0b89534b4b2176057c32 Patch-mainline: v6.8-rc4 -References: git-fixes bsc#1219810 +References: git-fixes bsc#1219810 CVE-2023-52639 bsc#1222300 Right now it is possible to see gmap->private being zero in kvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the diff --git a/patches.suse/can-j1939-Fix-UAF-in-j1939_sk_match_filter-during-se.patch b/patches.suse/can-j1939-Fix-UAF-in-j1939_sk_match_filter-during-se.patch index a181919..74f9fbc 100644 --- a/patches.suse/can-j1939-Fix-UAF-in-j1939_sk_match_filter-during-se.patch +++ b/patches.suse/can-j1939-Fix-UAF-in-j1939_sk_match_filter-during-se.patch @@ -4,7 +4,7 @@ Date: Fri, 20 Oct 2023 15:38:14 +0200 Subject: [PATCH] can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) Git-commit: efe7cf828039aedb297c1f9920b638fffee6aabc Patch-mainline: v6.8-rc5 -References: git-fixes +References: git-fixes CVE-2023-52637 bsc#1222291 Lock jsk->sk to prevent UAF when setsockopt(..., SO_J1939_FILTER, ...) modifies jsk->filters while receiving packets. diff --git a/patches.suse/can-j1939-prevent-deadlock-by-changing-j1939_socks_l.patch b/patches.suse/can-j1939-prevent-deadlock-by-changing-j1939_socks_l.patch index 0f61bd6..f13502c 100644 --- a/patches.suse/can-j1939-prevent-deadlock-by-changing-j1939_socks_l.patch +++ b/patches.suse/can-j1939-prevent-deadlock-by-changing-j1939_socks_l.patch @@ -4,7 +4,7 @@ Date: Fri, 21 Jul 2023 09:22:26 -0700 Subject: [PATCH] can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock Git-commit: 6cdedc18ba7b9dacc36466e27e3267d201948c8d Patch-mainline: v6.8-rc5 -References: git-fixes +References: git-fixes CVE-2023-52638 bsc#1222299 The following 3 locks would race against each other, causing the deadlock situation in the Syzbot bug report: diff --git a/patches.suse/drm-amd-display-Fix-disable_otg_wa-logic.patch b/patches.suse/drm-amd-display-Fix-disable_otg_wa-logic.patch index a7592bd..fc18e9b 100644 --- a/patches.suse/drm-amd-display-Fix-disable_otg_wa-logic.patch +++ b/patches.suse/drm-amd-display-Fix-disable_otg_wa-logic.patch @@ -4,7 +4,7 @@ Date: Fri, 1 Dec 2023 06:25:15 -0700 Subject: [PATCH] drm/amd/display: Fix disable_otg_wa logic Git-commit: 2ce156482a6fef349d2eba98e5070c412d3af662 Patch-mainline: v6.8-rc1 -References: git-fixes +References: git-fixes CVE-2023-52634 bsc#1222278 [ Upstream commit 2ce156482a6fef349d2eba98e5070c412d3af662 ] diff --git a/patches.suse/drm-amd-display-Refactor-DMCUB-enter-exit-idle-inter.patch b/patches.suse/drm-amd-display-Refactor-DMCUB-enter-exit-idle-inter.patch index 1d78399..bf0e6f8 100644 --- a/patches.suse/drm-amd-display-Refactor-DMCUB-enter-exit-idle-inter.patch +++ b/patches.suse/drm-amd-display-Refactor-DMCUB-enter-exit-idle-inter.patch @@ -4,7 +4,7 @@ Date: Mon, 4 Dec 2023 14:10:05 -0500 Subject: [PATCH] drm/amd/display: Refactor DMCUB enter/exit idle interface Git-commit: 8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa Patch-mainline: v6.8-rc1 -References: git-fixes +References: git-fixes CVE-2023-52625 bsc#1222085 [ Upstream commit 8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa ] diff --git a/patches.suse/drm-amd-display-Wake-DMCUB-before-executing-GPINT-co.patch b/patches.suse/drm-amd-display-Wake-DMCUB-before-executing-GPINT-co.patch index 0438c9d..b168f0f 100644 --- a/patches.suse/drm-amd-display-Wake-DMCUB-before-executing-GPINT-co.patch +++ b/patches.suse/drm-amd-display-Wake-DMCUB-before-executing-GPINT-co.patch @@ -4,7 +4,7 @@ Date: Tue, 5 Dec 2023 11:22:56 -0500 Subject: [PATCH] drm/amd/display: Wake DMCUB before executing GPINT commands Git-commit: e5ffd1263dd5b44929c676171802e7b6af483f21 Patch-mainline: v6.8-rc1 -References: git-fixes +References: git-fixes CVE-2023-52624 bsc#1222083 [ Upstream commit e5ffd1263dd5b44929c676171802e7b6af483f21 ] diff --git a/patches.suse/drm-amdkfd-Fix-lock-dependency-warning-with-srcu.patch b/patches.suse/drm-amdkfd-Fix-lock-dependency-warning-with-srcu.patch index 3edfac5..846ebae 100644 --- a/patches.suse/drm-amdkfd-Fix-lock-dependency-warning-with-srcu.patch +++ b/patches.suse/drm-amdkfd-Fix-lock-dependency-warning-with-srcu.patch @@ -4,7 +4,7 @@ Date: Fri, 29 Dec 2023 15:19:25 -0500 Subject: [PATCH] drm/amdkfd: Fix lock dependency warning with srcu Git-commit: 2a9de42e8d3c82c6990d226198602be44f43f340 Patch-mainline: v6.8-rc1 -References: git-fixes +References: git-fixes CVE-2023-52632 bsc#1222274 ====================================================== Warning: possible circular locking dependency detected diff --git a/patches.suse/libceph-just-wait-for-more-data-to-be-available-on-th.patch b/patches.suse/libceph-just-wait-for-more-data-to-be-available-on-th.patch index 796a15f..65edf5c 100644 --- a/patches.suse/libceph-just-wait-for-more-data-to-be-available-on-th.patch +++ b/patches.suse/libceph-just-wait-for-more-data-to-be-available-on-th.patch @@ -3,7 +3,7 @@ Date: Thu, 14 Dec 2023 16:01:03 +0800 Subject: libceph: just wait for more data to be available on the socket Git-commit: 8e46a2d068c92a905d01cbb018b00d66991585ab Patch-mainline: v6.8-rc4 -References: bsc#1221390 +References: bsc#1221390 CVE-2023-52636 bsc#1222247 A short read may occur while reading the message footer from the socket. Later, when the socket is ready for another read, the diff --git a/patches.suse/netfilter-nftables-exthdr-fix-4-byte-stack-OOB-write.patch b/patches.suse/netfilter-nftables-exthdr-fix-4-byte-stack-OOB-write.patch index 2149aa3..6d2ab24 100644 --- a/patches.suse/netfilter-nftables-exthdr-fix-4-byte-stack-OOB-write.patch +++ b/patches.suse/netfilter-nftables-exthdr-fix-4-byte-stack-OOB-write.patch @@ -3,7 +3,7 @@ Date: Tue, 5 Sep 2023 23:13:56 +0200 Subject: netfilter: nftables: exthdr: fix 4-byte stack OOB write Patch-mainline: v6.6-rc1 Git-commit: fd94d9dadee58e09b49075240fe83423eb1dcd36 -References: CVE-2023-4881 bsc#1215221 +References: CVE-2023-4881 bsc#1215221 CVE-2023-52628 bsc#1222117 If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption.