Bugzilla – Bug 1204705
Kernel 6.0.3: NULL pointer dereference + Plasma 5.26.1 session not working; 6.0.2 works
Last modified: 2023-01-18 17:58:14 UTC
Since updating from kernel 6.0.2 to 6.0.3 on openSUSE TW, KDE Plasma 5.26.1 running X11 or Wayland fails to start, after logging in from SDDM: * The cursor works, but no panel shows up, the desktop starts to freeze, i.e. turns gray after a while * Pressing CTRL+ALT+DEL opens the power-management overlay, where logging out works * Shutting down the system does not work after having logged in once, but takes infinitely long and requires a forced shut down Going back to kernel 6.0.2 fixes the issue. An interesting part of the journalctl is likely the following: ``` 09:56:43 kernel: BUG: kernel NULL pointer dereference, address: 00000000000001c8 09:56:43 kernel: #PF: supervisor write access in kernel mode 09:56:43 kernel: #PF: error_code(0x0002) - not-present page 09:56:43 kernel: PGD 0 P4D 0 09:56:43 kernel: Oops: 0002 [#1] PREEMPT SMP NOPTI 09:56:43 kernel: CPU: 16 PID: 1419 Comm: rasdaemon Tainted: G O 6.0.3-1-default #1 openSUSE Tumbleweed 50a6ebc5cb1873d6b9c639843cdd1ed0089a1281 09:56:43 kernel: Hardware name: System manufacturer System Product Name/ROG STRIX X570-E GAMING, BIOS 4204 02/24/2022 09:56:43 kernel: RIP: 0010:ring_buffer_wake_waiters+0x1c/0xa0 09:56:43 kernel: Code: 48 39 d0 73 ed 0f 0b eb e9 0f 1f 44 00 00 55 48 89 fd 53 48 63 de 83 fb ff 74 36 48 8b 47 40 48 8b 1c d8 48 81 c3 78 01 00 00 <48> 83 43 50 01 31 c9 31 d2 48 8d 7b 20 be 03 00 00 00 e8 cd af f3 09:56:43 kernel: RSP: 0018:ffffaa7a815a7e20 EFLAGS: 00010206 09:56:43 kernel: RAX: ffff908c434db500 RBX: 0000000000000178 RCX: 0000000000000010 09:56:43 kernel: RDX: ffff908c78ed8000 RSI: 0000000000000018 RDI: ffff908c434da900 09:56:43 kernel: RBP: ffff908c434da900 R08: ffff908c50b82e00 R09: ffff908c8206b200 09:56:43 kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff908c8206b200 09:56:43 kernel: R13: ffff908c4387ef20 R14: ffff908c90fddbc0 R15: 0000000000000000 09:56:43 kernel: FS: 00007fd7463a6340(0000) GS:ffff90934ee00000(0000) knlGS:0000000000000000 09:56:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 09:56:43 kernel: CR2: 00000000000001c8 CR3: 0000000105574000 CR4: 0000000000750ee0 09:56:43 kernel: PKRU: 55555554 09:56:43 kernel: Call Trace: 09:56:43 kernel: <TASK> 09:56:43 kernel: tracing_buffers_release+0x49/0x90 09:56:43 kernel: __fput+0x91/0x250 09:56:43 kernel: task_work_run+0x5c/0x90 09:56:43 kernel: exit_to_user_mode_prepare+0x1cb/0x1f0 09:56:43 kernel: syscall_exit_to_user_mode+0x17/0x40 09:56:43 kernel: do_syscall_64+0x67/0x80 09:56:43 kernel: ? syscall_exit_to_user_mode+0x17/0x40 09:56:43 kernel: ? do_syscall_64+0x67/0x80 09:56:43 kernel: ? do_syscall_64+0x67/0x80 09:56:43 kernel: ? syscall_exit_to_user_mode+0x17/0x40 09:56:43 kernel: ? do_syscall_64+0x67/0x80 09:56:43 kernel: ? do_syscall_64+0x67/0x80 09:56:43 kernel: ? do_syscall_64+0x67/0x80 09:56:43 kernel: ? do_syscall_64+0x67/0x80 09:56:43 kernel: ? do_syscall_64+0x67/0x80 09:56:43 kernel: entry_SYSCALL_64_after_hwframe+0x63/0xcd 09:56:43 kernel: RIP: 0033:0x7fd74658e014 09:56:43 kernel: Code: 00 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 90 90 80 3d 8d 09 0f 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 51 09:56:43 kernel: RSP: 002b:00007ffce5e64348 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 09:56:43 kernel: RAX: 0000000000000000 RBX: 00007ffce5e64490 RCX: 00007fd74658e014 09:56:43 kernel: RDX: 0000000000000000 RSI: 00007ffce5e64540 RDI: 000000000000001d 09:56:43 kernel: RBP: 00007ffce5e65a10 R08: 000055939344e6c0 R09: 0000000000000000 09:56:43 kernel: R10: 0000000000000008 R11: 0000000000000202 R12: 0000000000000001 09:56:43 kernel: R13: 00007ffce5e644d8 R14: 000055939344e6c0 R15: 000055939344e6c0 09:56:43 kernel: </TASK> 09:56:43 kernel: Modules linked in: amd64_edac(-) cmac algif_hash algif_skcipher af_alg vboxdrv(O) qrtr bnep dmi_sysfs wacom nls_iso8859_1 nls_cp437 vfat fat intel_rapl_msr iwlmvm intel_rapl_common asus_ec_sensors mac80211 libarc4 snd_hda_codec_realtek snd_hda_codec_generic btusb edac_mce_amd snd_hda_codec_hdmi btrtl snd_usb_audio btbcm snd_hda_intel btintel snd_intel_dspcfg btmtk snd_intel_sdw_acpi kvm_amd snd_hda_codec snd_usbmidi_lib iwlwifi bluetooth snd_rawmidi snd_hda_core joydev snd_seq_device kvm ecdh_generic eeepc_wmi snd_hwdep asus_wmi cfg80211 battery snd_pcm irqbypass ledtrig_audio sparse_keymap r8169 platform_profile snd_timer video pcspkr wmi_bmof efi_pstore mxm_wmi realtek snd igb k10temp i2c_piix4 mdio_devres soundcore libphy rfkill dca tiny_power_button button acpi_cpufreq fuse configfs ip_tables x_tables hid_generic usbhid amdgpu crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic gf128mul xhci_pci xhci_pci_renesas drm_ttm_helper ttm xhci_hcd 09:56:43 kernel: iommu_v2 gpu_sched ghash_clmulni_intel drm_buddy aesni_intel drm_display_helper nvme usbcore crypto_simd cryptd cec ccp nvme_core sp5100_tco rc_core wmi btrfs blake2b_generic libcrc32c crc32c_intel xor raid6_pq v4l2loopback(O) videodev mc sg br_netfilter bridge stp llc dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua msr efivarfs 09:56:43 kernel: CR2: 00000000000001c8 09:56:43 kernel: ---[ end trace 0000000000000000 ]--- 09:56:43 kernel: RIP: 0010:ring_buffer_wake_waiters+0x1c/0xa0 09:56:43 kernel: Code: 48 39 d0 73 ed 0f 0b eb e9 0f 1f 44 00 00 55 48 89 fd 53 48 63 de 83 fb ff 74 36 48 8b 47 40 48 8b 1c d8 48 81 c3 78 01 00 00 <48> 83 43 50 01 31 c9 31 d2 48 8d 7b 20 be 03 00 00 00 e8 cd af f3 09:56:43 kernel: RSP: 0018:ffffaa7a815a7e20 EFLAGS: 00010206 09:56:43 kernel: RAX: ffff908c434db500 RBX: 0000000000000178 RCX: 0000000000000010 09:56:43 kernel: RDX: ffff908c78ed8000 RSI: 0000000000000018 RDI: ffff908c434da900 09:56:43 kernel: RBP: ffff908c434da900 R08: ffff908c50b82e00 R09: ffff908c8206b200 09:56:43 kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff908c8206b200 09:56:43 kernel: R13: ffff908c4387ef20 R14: ffff908c90fddbc0 R15: 0000000000000000 09:56:43 kernel: FS: 00007fd7463a6340(0000) GS:ffff90934ee00000(0000) knlGS:0000000000000000 09:56:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 09:56:43 kernel: CR2: 00000000000001c8 CR3: 0000000105574000 CR4: 0000000000750ee0 09:56:43 kernel: PKRU: 55555554 ``` SOFTWARE/OS VERSIONS Operating System: openSUSE Tumbleweed 20221023 KDE Plasma Version: 5.26.1 KDE Frameworks Version: 5.99.0 Qt Version: 5.15.6 Kernel Version: 6.0.2-1-default (64-bit) / 6.0.3-1-default (64-bit) Graphics Platform: Wayland Graphics Processor: AMD Radeon RX 580 Series
Since I could not attach a txt file here (for some technical reasons), I have pasted the content of the journalctl log in [1]. [1] https://paste.opensuse.org/60ae1b9c
And the corresponding dmesg [2] [2] https://paste.opensuse.org/d9fa4931
Could you check whether the same bug is triggered with 6.1-rc kernel in OBS Kernel:HEAD?
Also, I'm building a test kernel with a suspected patch reverted. It's being build in OBS home:tiwai:bsc1204705 repo. Once after the build finishes, could you give it a try, too?
(In reply to Takashi Iwai from comment #3) > Could you check whether the same bug is triggered with 6.1-rc kernel in OBS > Kernel:HEAD? The issue persists with 6.1.0-rc2-1.g796d87f-default ``` 7:01:00 kernel: BUG: kernel NULL pointer dereference, address: 00000000000001c8 17:01:00 kernel: #PF: supervisor write access in kernel mode 17:01:00 kernel: #PF: error_code(0x0002) - not-present page 17:01:00 kernel: PGD 0 P4D 0 17:01:00 kernel: Oops: 0002 [#1] PREEMPT SMP NOPTI 17:01:00 kernel: CPU: 1 PID: 1439 Comm: rasdaemon Not tainted 6.1.0-rc2-1.g796d87f-default #1 openSUSE Tumbleweed (unreleased) 2a6c86ca26b919960b25f42a93c747e865d741cd 17:01:00 kernel: Hardware name: System manufacturer System Product Name/ROG STRIX X570-E GAMING, BIOS 4204 02/24/2022 17:01:00 kernel: RIP: 0010:ring_buffer_wake_waiters+0x1c/0xa0 17:01:00 kernel: Code: 48 39 d0 73 ed 0f 0b eb e9 0f 1f 44 00 00 55 53 48 89 fb 83 fe ff 74 39 48 8b 47 40 48 63 f6 48 8b 1c f0 48 81 c3 78 01 00 00 <48> 83 43 50 01 31 c9 31 d2 48 8d 7b 20 be 03 00 00 00 e8 bd a7 f3 17:01:00 kernel: RSP: 0018:ffffaf16c140fe70 EFLAGS: 00010206 17:01:00 kernel: RAX: ffff9a22c45d6a00 RBX: 0000000000000178 RCX: 0000000000000001 17:01:00 kernel: RDX: ffff9a22c4d54000 RSI: 0000000000000018 RDI: ffff9a22c45d7d00 17:01:00 kernel: RBP: 00000000000a8001 R08: ffff9a22c9c30e40 R09: ffff9a23128df980 17:01:00 kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff9a23128df980 17:01:00 kernel: R13: ffff9a22e38932e0 R14: ffff9a231284ee40 R15: 0000000000000000 17:01:00 kernel: FS: 00007fbe25c5b340(0000) GS:ffff9a29cea40000(0000) knlGS:0000000000000000 17:01:00 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 17:01:00 kernel: CR2: 00000000000001c8 CR3: 000000010501e000 CR4: 0000000000750ee0 17:01:00 kernel: PKRU: 55555554 17:01:00 kernel: Call Trace: 17:01:00 kernel: <TASK> 17:01:00 kernel: tracing_buffers_release+0x49/0x90 17:01:00 kernel: __fput+0x91/0x250 17:01:00 kernel: task_work_run+0x59/0x90 17:01:00 kernel: exit_to_user_mode_prepare+0x1cb/0x1f0 17:01:00 kernel: syscall_exit_to_user_mode+0x17/0x40 17:01:00 kernel: do_syscall_64+0x67/0x80 17:01:00 kernel: ? syscall_exit_to_user_mode+0x17/0x40 17:01:00 kernel: ? do_syscall_64+0x67/0x80 17:01:00 kernel: entry_SYSCALL_64_after_hwframe+0x63/0xcd 17:01:00 kernel: RIP: 0033:0x7fbe25e43014 17:01:00 kernel: Code: 00 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 90 90 80 3d 8d 09 0f 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 51 17:01:00 kernel: RSP: 002b:00007ffda7a81408 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 17:01:00 kernel: RAX: 0000000000000000 RBX: 00007ffda7a81550 RCX: 00007fbe25e43014 17:01:00 kernel: RDX: 0000000000000000 RSI: 00007ffda7a81600 RDI: 000000000000001d 17:01:00 kernel: RBP: 00007ffda7a82ad0 R08: 000055ffa06b86c0 R09: 0000000000000000 17:01:00 kernel: R10: 0000000000000008 R11: 0000000000000202 R12: 0000000000000001 17:01:00 kernel: R13: 00007ffda7a81598 R14: 000055ffa06b86c0 R15: 000055ffa06b86c0 17:01:00 kernel: </TASK> 17:01:00 kernel: Modules linked in: amd64_edac(-) dmi_sysfs pcc_cpufreq(-) iwlmvm btusb mac80211 btrtl btbcm btintel btmtk libarc4 wacom bluetooth snd_usb_audio snd_usbmidi_lib intel_rapl_msr snd_rawmidi r8169 snd_seq_device realtek mc ecdh_generic iwlwifi igb mdio_devres cfg80211 libphy dca nls_iso8859_1 nls_cp437 intel_rapl_common vfat fat snd_hda_codec_realtek snd_hda_codec_generic asus_ec_sensors snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg edac_mce_amd snd_intel_sdw_acpi snd_hda_codec kvm_amd eeepc_wmi joydev snd_hda_core asus_wmi snd_hwdep kvm irqbypass battery snd_pcm ledtrig_audio sparse_keymap platform_profile rfkill pcspkr efi_pstore snd_timer wmi_bmof mxm_wmi k10temp i2c_piix4 snd soundcore tiny_power_button button acpi_cpufreq fuse configfs ip_tables x_tables hid_generic usbhid amdgpu crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic gf128mul xhci_pci xhci_pci_renesas drm_ttm_helper ttm xhci_hcd video iommu_v2 ghash_clmulni_intel gpu_sched 17:01:00 kernel: sha512_ssse3 drm_buddy drm_display_helper aesni_intel cec nvme crypto_simd cryptd usbcore ccp rc_core sp5100_tco nvme_core wmi btrfs blake2b_generic libcrc32c crc32c_intel xor raid6_pq sg br_netfilter bridge stp llc dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua msr efivarfs 17:01:00 kernel: CR2: 00000000000001c8 17:01:00 kernel: ---[ end trace 0000000000000000 ]--- 17:01:00 kernel: RIP: 0010:ring_buffer_wake_waiters+0x1c/0xa0 17:01:00 kernel: Code: 48 39 d0 73 ed 0f 0b eb e9 0f 1f 44 00 00 55 53 48 89 fb 83 fe ff 74 39 48 8b 47 40 48 63 f6 48 8b 1c f0 48 81 c3 78 01 00 00 <48> 83 43 50 01 31 c9 31 d2 48 8d 7b 20 be 03 00 00 00 e8 bd a7 f3 17:01:00 kernel: RSP: 0018:ffffaf16c140fe70 EFLAGS: 00010206 17:01:00 kernel: RAX: ffff9a22c45d6a00 RBX: 0000000000000178 RCX: 0000000000000001 17:01:00 kernel: RDX: ffff9a22c4d54000 RSI: 0000000000000018 RDI: ffff9a22c45d7d00 17:01:00 kernel: RBP: 00000000000a8001 R08: ffff9a22c9c30e40 R09: ffff9a23128df980 17:01:00 kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff9a23128df980 17:01:00 kernel: R13: ffff9a22e38932e0 R14: ffff9a231284ee40 R15: 0000000000000000 17:01:00 kernel: FS: 00007fbe25c5b340(0000) GS:ffff9a29cea40000(0000) knlGS:0000000000000000 17:01:00 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 17:01:00 kernel: CR2: 00000000000001c8 CR3: 000000010501e000 CR4: 0000000000750ee0 17:01:00 kernel: PKRU: 55555554 ```
(In reply to Takashi Iwai from comment #4) > Also, I'm building a test kernel with a suspected patch reverted. It's > being build in OBS home:tiwai:bsc1204705 repo. Once after the build > finishes, could you give it a try, too? I will give it a try, but it looks like the latest build failed.
My bad. Now refreshed and triggered the rebuild. Let's cross fingers.
BTW, the problem of uploading attachments on bugzilla should have been fixed now. Could you upload the dmesg from 6.1-rc kernel to Bugzilla?
Created attachment 862454 [details] dmesg for kernel 6.1.0-rc2-1.g796d87f-default
Created attachment 862455 [details] dmesg for kernel 6.1.0-rc2-1.g796d87f-default
(In reply to Takashi Iwai from comment #7) > My bad. Now refreshed and triggered the rebuild. Let's cross fingers. Looks like it failed again. :-( Could you please also post your patch here? Thank you!
Please give the dmesg output. My test kernel was just dropping two patches: patches.kernel.org/6.0.3-159-tracing-Wake-up-ring-buffer-waiters-on-closing-.patch patches.kernel.org/6.0.3-160-tracing-Wake-up-waiters-when-tracing-is-disable.patch I guess the best is to do git bisect in your side between 6.0.2 and 6.0.3 kernels.
(In reply to Takashi Iwai from comment #12) > Please give the dmesg output. Please see comment 10 or is this not the one you are looking for? > I guess the best is to do git bisect in your side between 6.0.2 and 6.0.3 kernels. I will give it a try!
(In reply to Alex Debus from comment #13) > (In reply to Takashi Iwai from comment #12) > > Please give the dmesg output. > > Please see comment 10 or is this not the one you are looking for? I asked the result with my test kernel mentioned in comment 4.
Created attachment 862547 [details] diff between 6.0.3 and the working patched kernel (In reply to Takashi Iwai from comment #12) > My test kernel was just dropping two patches: > > patches.kernel.org/6.0.3-159-tracing-Wake-up-ring-buffer-waiters-on-closing-. > patch You already had hit the nail! > I guess the best is to do git bisect in your side between 6.0.2 and 6.0.3 > kernels. I have bisected the 6.0.3 branch and found that commit `f3ddb74ad0790030c9592229fb14d8c451f4e9a8` is faulty. To verify it, I have checked out v6.0.3, applied the attached diff, which basically reverts the commit, built and booted it and it simply works. :)
Created attachment 862548 [details] dmesg for working patched kernel
Created attachment 862549 [details] diff between v6.0.5 and the working patched kernel I have applied the same procedure the v6.0.5 branch. Please see the diff.
Created attachment 862550 [details] dmesg for kernel 6.0.5 (w/o the patch)
Created attachment 862551 [details] dmesg for kernel 6.0.5 (with the patch)
Created attachment 862552 [details] diff between v6.1.0-rc2 and the working patched kernel Also reverted the changes for kernel 6.1.0-rc2, which now boots fine again. Please see the diff.
Created attachment 862553 [details] dmesg for kernel 6.1.0-rc2 (w/o the patch)
Created attachment 862554 [details] dmesg for kernel 6.1.0-rc2 (with the patch)
Thanks! I reported it to the upstream dev now. https://lore.kernel.org/87h6zklb6n.wl-tiwai@suse.de
Steven asked whether the following change would work around the crash: --- a/kernel/trace/ring_buffer.c +++ b/kernel/trace/ring_buffer.c @@ -937,6 +937,9 @@ void ring_buffer_wake_waiters(struct trace_buffer *buffer, int cpu) struct ring_buffer_per_cpu *cpu_buffer; struct rb_irq_work *rbwork; + if (!buffer) + return; + if (cpu == RING_BUFFER_ALL_CPUS) { /* Wake up individual ones too. One level recursion */ Could you try it quickly on your built kernel? Meanwhile, I've updated the kernel to 6.0.6 in OBS home:tiwai:bsc1204705 with this patch (instead of the revert): http://download.opensuse.org/repositories/home:/tiwai:/bsc1204705/standard/ There was already a negative result in the upstream thread above, but we should double-check. Thanks!
Ah, now I realized that it was you who posted the test result, so scratch my previous request ;) It's good that you joined in the thread. Then let's continue to track there.
Steven submitted the fix patch to the upstream https://lore.kernel.org/r/20221101191009.1e7378c8@rorschach.local.home I backported it to stable branch now. A test kernel in OBS home:tiwai:bsc1204705 was built with this patch. You can test with it, too.
(In reply to Takashi Iwai from comment #26) > Steven submitted the fix patch to the upstream > https://lore.kernel.org/r/20221101191009.1e7378c8@rorschach.local.home Thank you. I have tested the patch and verified that it resolves the issue! Just note Steve's comment in [1] regarding the dmsg log [2] > Yes that's known too. rasdaemon needs to be updated to use the libtracefs library, which should fix all this. [1] https://lore.kernel.org/all/20221102123922.790e72bd@rorschach.local.home/ [2] https://paste.opensuse.org/e8d4fa46
Fixed with Kernel 6.0.8+
SUSE-SU-2022:3998-1: An update that solves 37 vulnerabilities, contains 25 features and has 38 fixes is now available. Category: security (important) Bug References: 1065729,1071995,1152472,1152489,1188238,1194869,1196018,1196632,1199904,1200567,1200692,1200788,1202187,1202686,1202700,1202914,1203098,1203229,1203290,1203435,1203514,1203699,1203701,1203767,1203770,1203802,1203922,1203979,1204017,1204051,1204059,1204060,1204125,1204142,1204166,1204168,1204171,1204241,1204353,1204354,1204355,1204402,1204413,1204415,1204417,1204428,1204431,1204439,1204470,1204479,1204498,1204533,1204569,1204574,1204575,1204619,1204635,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204753,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970 CVE References: CVE-2022-1882,CVE-2022-2153,CVE-2022-28748,CVE-2022-2964,CVE-2022-2978,CVE-2022-3169,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3640,CVE-2022-3646,CVE-2022-3649,CVE-2022-40476,CVE-2022-40768,CVE-2022-41674,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-43750 JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1649,PED-634,PED-676,PED-678,PED-679,PED-707,PED-732,PED-813,PED-817,PED-822,PED-825,PED-833,PED-842,PED-846,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-9246 Sources used: openSUSE Leap 15.4 (src): kernel-azure-5.14.21-150400.14.21.2, kernel-source-azure-5.14.21-150400.14.21.1, kernel-syms-azure-5.14.21-150400.14.21.1 SUSE Linux Enterprise Module for Public Cloud 15-SP4 (src): kernel-azure-5.14.21-150400.14.21.2, kernel-source-azure-5.14.21-150400.14.21.1, kernel-syms-azure-5.14.21-150400.14.21.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4072-1: An update that solves 32 vulnerabilities, contains 25 features and has 36 fixes is now available. Category: security (important) Bug References: 1065729,1071995,1152472,1152489,1188238,1194869,1196018,1196632,1199904,1200567,1200692,1200788,1202187,1202686,1202700,1202914,1203098,1203229,1203290,1203435,1203514,1203699,1203767,1203802,1203922,1204017,1204142,1204166,1204168,1204171,1204241,1204353,1204354,1204355,1204402,1204413,1204415,1204417,1204428,1204431,1204439,1204470,1204479,1204498,1204533,1204569,1204574,1204575,1204619,1204635,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204753,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970 CVE References: CVE-2022-1882,CVE-2022-2153,CVE-2022-28748,CVE-2022-2964,CVE-2022-2978,CVE-2022-3169,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3640,CVE-2022-3646,CVE-2022-3649,CVE-2022-40476,CVE-2022-40768,CVE-2022-42703,CVE-2022-43750 JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1649,PED-634,PED-676,PED-678,PED-679,PED-707,PED-732,PED-813,PED-817,PED-822,PED-825,PED-833,PED-842,PED-846,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-9246 Sources used: openSUSE Leap 15.4 (src): dtb-aarch64-5.14.21-150400.24.33.1, kernel-64kb-5.14.21-150400.24.33.2, kernel-debug-5.14.21-150400.24.33.2, kernel-default-5.14.21-150400.24.33.2, kernel-default-base-5.14.21-150400.24.33.2.150400.24.11.4, kernel-docs-5.14.21-150400.24.33.2, kernel-kvmsmall-5.14.21-150400.24.33.2, kernel-obs-build-5.14.21-150400.24.33.1, kernel-obs-qa-5.14.21-150400.24.33.1, kernel-source-5.14.21-150400.24.33.1, kernel-syms-5.14.21-150400.24.33.1, kernel-zfcpdump-5.14.21-150400.24.33.2 SUSE Linux Enterprise Workstation Extension 15-SP4 (src): kernel-default-5.14.21-150400.24.33.2 SUSE Linux Enterprise Module for Live Patching 15-SP4 (src): kernel-default-5.14.21-150400.24.33.2, kernel-livepatch-SLE15-SP4_Update_5-1-150400.9.3.4 SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src): kernel-default-5.14.21-150400.24.33.2 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): kernel-docs-5.14.21-150400.24.33.2, kernel-obs-build-5.14.21-150400.24.33.1, kernel-source-5.14.21-150400.24.33.1, kernel-syms-5.14.21-150400.24.33.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): kernel-64kb-5.14.21-150400.24.33.2, kernel-default-5.14.21-150400.24.33.2, kernel-default-base-5.14.21-150400.24.33.2.150400.24.11.4, kernel-source-5.14.21-150400.24.33.1, kernel-zfcpdump-5.14.21-150400.24.33.2 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-5.14.21-150400.24.33.2, kernel-default-base-5.14.21-150400.24.33.2.150400.24.11.4 SUSE Linux Enterprise High Availability 15-SP4 (src): kernel-default-5.14.21-150400.24.33.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4617-1: An update that solves 96 vulnerabilities, contains 50 features and has 246 fixes is now available. Category: security (important) Bug References: 1023051,1032323,1065729,1071995,1152472,1152489,1156395,1164051,1177471,1184350,1185032,1188238,1189297,1189999,1190256,1190497,1190969,1192968,1193629,1194023,1194592,1194869,1194904,1195480,1195917,1196018,1196444,1196616,1196632,1196867,1196869,1197158,1197391,1197659,1197755,1197756,1197757,1197763,1198189,1198410,1198577,1198702,1198971,1199086,1199364,1199515,1199670,1199904,1200015,1200058,1200268,1200288,1200301,1200313,1200431,1200465,1200494,1200544,1200567,1200622,1200644,1200651,1200692,1200788,1200845,1200868,1200869,1200870,1200871,1200872,1200873,1201019,1201308,1201309,1201310,1201361,1201427,1201442,1201455,1201489,1201610,1201675,1201725,1201726,1201768,1201865,1201940,1201941,1201948,1201954,1201956,1201958,1202095,1202096,1202097,1202113,1202131,1202154,1202187,1202262,1202265,1202312,1202341,1202346,1202347,1202385,1202393,1202447,1202471,1202558,1202623,1202636,1202672,1202681,1202685,1202686,1202700,1202710,1202711,1202712,1202713,1202715,1202716,1202757,1202758,1202759,1202761,1202762,1202763,1202764,1202765,1202766,1202767,1202768,1202769,1202770,1202771,1202773,1202774,1202775,1202776,1202778,1202779,1202780,1202781,1202782,1202783,1202822,1202823,1202824,1202860,1202867,1202872,1202874,1202898,1202914,1202960,1202989,1202992,1202993,1203002,1203008,1203036,1203039,1203041,1203063,1203066,1203067,1203098,1203101,1203107,1203116,1203117,1203138,1203139,1203159,1203183,1203197,1203208,1203229,1203263,1203290,1203338,1203360,1203361,1203389,1203391,1203410,1203435,1203505,1203511,1203514,1203552,1203606,1203664,1203693,1203699,1203767,1203769,1203770,1203794,1203798,1203802,1203829,1203893,1203902,1203906,1203908,1203922,1203935,1203939,1203960,1203969,1203987,1203992,1203994,1204017,1204051,1204059,1204060,1204092,1204125,1204132,1204142,1204166,1204168,1204170,1204171,1204183,1204228,1204241,1204289,1204290,1204291,1204292,1204353,1204354,1204355,1204402,1204405,1204413,1204414,1204415,1204417,1204424,1204428,1204431,1204432,1204439,1204470,1204479,1204486,1204498,1204533,1204569,1204574,1204575,1204576,1204619,1204624,1204631,1204635,1204636,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204745,1204753,1204780,1204810,1204850,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970,1205007,1205100,1205111,1205113,1205128,1205130,1205149,1205153,1205220,1205257,1205264,1205282,1205313,1205331,1205332,1205427,1205428,1205473,1205496,1205507,1205514,1205521,1205567,1205616,1205617,1205653,1205671,1205679,1205683,1205700,1205705,1205709,1205711,1205744,1205764,1205796,1205882,1205993,1206035,1206036,1206037,1206045,1206046,1206047,1206048,1206049,1206050,1206051,1206056,1206057,1206113,1206114,1206147,1206149,1206207,1206273,1206391 CVE References: CVE-2016-3695,CVE-2020-16119,CVE-2020-36516,CVE-2021-33135,CVE-2021-4037,CVE-2022-1184,CVE-2022-1263,CVE-2022-1882,CVE-2022-20368,CVE-2022-20369,CVE-2022-2153,CVE-2022-2586,CVE-2022-2588,CVE-2022-2602,CVE-2022-26373,CVE-2022-2639,CVE-2022-2663,CVE-2022-28356,CVE-2022-28693,CVE-2022-2873,CVE-2022-28748,CVE-2022-2905,CVE-2022-2938,CVE-2022-2959,CVE-2022-2964,CVE-2022-2977,CVE-2022-2978,CVE-2022-3028,CVE-2022-3078,CVE-2022-3114,CVE-2022-3169,CVE-2022-3176,CVE-2022-3202,CVE-2022-32250,CVE-2022-32296,CVE-2022-3239,CVE-2022-3303,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3635,CVE-2022-3640,CVE-2022-3643,CVE-2022-3646,CVE-2022-3649,CVE-2022-36879,CVE-2022-36946,CVE-2022-3707,CVE-2022-3903,CVE-2022-39188,CVE-2022-39189,CVE-2022-39190,CVE-2022-40476,CVE-2022-40768,CVE-2022-4095,CVE-2022-41218,CVE-2022-4129,CVE-2022-4139,CVE-2022-41674,CVE-2022-41848,CVE-2022-41849,CVE-2022-41850,CVE-2022-41858,CVE-2022-42328,CVE-2022-42329,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-42895,CVE-2022-42896,CVE-2022-43750,CVE-2022-4378,CVE-2022-43945,CVE-2022-45869,CVE-2022-45888,CVE-2022-45934 JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1573,PED-1649,PED-1706,PED-1936,PED-2684,PED-387,PED-529,PED-611,PED-634,PED-652,PED-664,PED-676,PED-678,PED-679,PED-682,PED-688,PED-707,PED-720,PED-729,PED-732,PED-755,PED-763,PED-813,PED-817,PED-822,PED-824,PED-825,PED-833,PED-842,PED-846,PED-849,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-18130,SLE-19359,SLE-19924,SLE-20183,SLE-23766,SLE-24572,SLE-24682,SLE-24814,SLE-9246 Sources used: openSUSE Leap Micro 5.3 (src): kernel-rt-5.14.21-150400.15.5.1 openSUSE Leap 15.4 (src): kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1 SUSE Linux Enterprise Module for Realtime 15-SP4 (src): kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1 SUSE Linux Enterprise Module for Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_1-1-150400.1.3.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-rt-5.14.21-150400.15.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.