forked from kernelbugs/kernel-source
Compare commits
3 Commits
Kernel/SLE
...
Kernel/SLE
| Author | SHA256 | Date | |
|---|---|---|---|
| d60296228c | |||
| be7cbd78e2 | |||
| 7eecc54cef |
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -27,7 +27,7 @@
|
||||
Name: dtb-aarch64
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -27,7 +27,7 @@
|
||||
Name: dtb-armv7l
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -19,7 +19,7 @@
|
||||
|
||||
%define srcversion 6.4
|
||||
%define patchversion 6.4.0
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
%define compress_modules zstd
|
||||
%define compress_vmlinux gz
|
||||
@@ -42,7 +42,7 @@
|
||||
Name: kernel-64kb
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -19,7 +19,7 @@
|
||||
|
||||
%define srcversion 6.4
|
||||
%define patchversion 6.4.0
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
%define compress_modules zstd
|
||||
%define compress_vmlinux gz
|
||||
@@ -42,7 +42,7 @@
|
||||
Name: kernel-debug
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -19,7 +19,7 @@
|
||||
|
||||
%define srcversion 6.4
|
||||
%define patchversion 6.4.0
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
%define compress_modules zstd
|
||||
%define compress_vmlinux gz
|
||||
@@ -42,7 +42,7 @@
|
||||
Name: kernel-default
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -18,7 +18,7 @@
|
||||
|
||||
%define srcversion 6.4
|
||||
%define patchversion 6.4.0
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
%define build_html 1
|
||||
%define build_pdf 0
|
||||
@@ -30,7 +30,7 @@
|
||||
Name: kernel-docs
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -19,7 +19,7 @@
|
||||
|
||||
%define srcversion 6.4
|
||||
%define patchversion 6.4.0
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
%define compress_modules zstd
|
||||
%define compress_vmlinux gz
|
||||
@@ -42,7 +42,7 @@
|
||||
Name: kernel-kvmsmall
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -19,7 +19,7 @@
|
||||
|
||||
%define srcversion 6.4
|
||||
%define patchversion 6.4.0
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
%define compress_modules zstd
|
||||
%define compress_vmlinux gz
|
||||
@@ -42,7 +42,7 @@
|
||||
Name: kernel-lpae
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -38,7 +38,7 @@
|
||||
%endif
|
||||
%endif
|
||||
%endif
|
||||
%global kernel_package kernel%kernel_flavor-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%global kernel_package kernel%kernel_flavor-srchash-33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%endif
|
||||
%if 0%{?rhel_version}
|
||||
%global kernel_package kernel
|
||||
@@ -47,14 +47,14 @@
|
||||
Name: kernel-obs-build
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
Summary: package kernel and initrd for OBS VM builds
|
||||
License: GPL-2.0-only
|
||||
Group: SLES
|
||||
Provides: kernel-obs-build-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
Provides: kernel-obs-build-srchash-33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
BuildRequires: coreutils
|
||||
BuildRequires: device-mapper
|
||||
BuildRequires: dracut
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -25,7 +25,7 @@
|
||||
Name: kernel-obs-qa
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
@@ -36,7 +36,7 @@ BuildRequires: kernel-default
|
||||
# kernel-obs-build must be also configured as VMinstall, but is required
|
||||
# here as well to avoid that qa and build package build parallel
|
||||
%if ! 0%{?qemu_user_space_build}
|
||||
BuildRequires: kernel-obs-build-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
BuildRequires: kernel-obs-build-srchash-33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%endif
|
||||
BuildRequires: modutils
|
||||
ExclusiveArch: aarch64 armv7hl ppc64le s390x x86_64
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -18,7 +18,7 @@
|
||||
|
||||
%define srcversion 6.4
|
||||
%define patchversion 6.4.0
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
%define gcc_package gcc
|
||||
%define gcc_compiler gcc
|
||||
@@ -30,7 +30,7 @@
|
||||
Name: kernel-source
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -16,7 +16,7 @@
|
||||
#
|
||||
|
||||
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
|
||||
%include %_sourcedir/kernel-spec-macros
|
||||
@@ -24,7 +24,7 @@
|
||||
Name: kernel-syms
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
@@ -1,3 +1,76 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: send: check for inline extents in
|
||||
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
|
||||
- commit b93c18b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
|
||||
|
||||
- btrfs: reject new transactions if the fs is fully read-only
|
||||
(bsc#1258464 CVE-2026-23214).
|
||||
- commit c375a48
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
|
||||
|
||||
- macvlan: observe an RCU grace period in macvlan_common_newlink()
|
||||
error path (CVE-2026-23209 bsc#1258518).
|
||||
- macvlan: fix error recovery in macvlan_common_newlink()
|
||||
(CVE-2026-23209 bsc#1258518).
|
||||
- commit eaf1535
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
|
||||
|
||||
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
|
||||
reply queue (CVE-2025-37861 bsc#1243055).
|
||||
- commit 807000c
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
|
||||
|
||||
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
|
||||
bsc#1258395).
|
||||
- commit 114f0d2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: authencesn - reject too-short AAD (assoclen<8) to
|
||||
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
|
||||
- commit 9347d8b
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - zero initialize memory allocated via
|
||||
sock_kmalloc (bsc#1256716 CVE-2025-71113).
|
||||
- commit 449e0ae
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
|
||||
(bsc#1254992 CVE-2023-53817).
|
||||
- commit f8259ad
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
- commit 2a9a19a
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
|
||||
|
||||
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
|
||||
(bsc#1251966 CVE-2025-39964).
|
||||
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
|
||||
- commit a6b1063
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz
|
||||
|
||||
|
||||
@@ -19,7 +19,7 @@
|
||||
|
||||
%define srcversion 6.4
|
||||
%define patchversion 6.4.0
|
||||
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
%define variant %{nil}
|
||||
%define compress_modules zstd
|
||||
%define compress_vmlinux gz
|
||||
@@ -42,7 +42,7 @@
|
||||
Name: kernel-zfcpdump
|
||||
Version: 6.4.0
|
||||
%if 0%{?is_kotd}
|
||||
Release: <RELEASE>.gbaf4c48
|
||||
Release: <RELEASE>.g33c8f6b
|
||||
%else
|
||||
Release: 0
|
||||
%endif
|
||||
|
||||
BIN
patches.suse.tar.bz2
LFS
BIN
patches.suse.tar.bz2
LFS
Binary file not shown.
11
series.conf
11
series.conf
@@ -7804,6 +7804,7 @@
|
||||
patches.suse/crypto-af_alg-Decrement-struct-key.usage-in-alg_set_.patch
|
||||
patches.suse/crypto-qat-use-kfree_sensitive-instead-of-memset-kfr.patch
|
||||
patches.suse/crypto-api-Use-work-queue-in-crypto_destroy_instance.patch
|
||||
patches.suse/crypto-lib-mpi-avoid-null-pointer-deref-in-mpi_cmp_u.patch
|
||||
patches.suse/crypto-jitter-Add-clarifying-comments-to-Jitter-Entr.patch
|
||||
patches.suse/crypto-caam-fix-unchecked-return-value-error.patch
|
||||
patches.suse/crypto-qat-Remove-unused-function-declarations.patch
|
||||
@@ -31802,6 +31803,7 @@
|
||||
patches.suse/ahci-add-PCI-ID-for-Marvell-88SE9215-SATA-Controller.patch
|
||||
patches.suse/ata-libata-Fix-NCQ-Non-Data-log-not-supported-print.patch
|
||||
patches.suse/scsi-st-Restore-some-drive-settings-after-reset.patch
|
||||
patches.suse/scsi-mpi3mr-Synchronous-access-b-w-reset-and-tm-thread-for.patch
|
||||
patches.suse/scsi-lpfc-Reduce-log-message-generation-during-ELS-r.patch
|
||||
patches.suse/scsi-lpfc-Free-phba-irq-in-lpfc_sli4_enable_msi-when.patch
|
||||
patches.suse/scsi-lpfc-Ignore-ndlp-rport-mismatch-in-dev_loss_tmo.patch
|
||||
@@ -34674,6 +34676,7 @@
|
||||
patches.suse/ASoC-rt5682s-Adjust-SAR-ADC-button-mode-to-fix-noise.patch
|
||||
patches.suse/ALSA-hda-realtek-Fix-mute-led-for-HP-Laptop-15-dw4xx.patch
|
||||
patches.suse/crypto-af_alg-Set-merge-to-zero-early-in-af_alg_send.patch
|
||||
patches.suse/crypto-af_alg-Disallow-concurrent-writes-in-af_alg_s.patch
|
||||
patches.suse/mmc-mvsdio-Fix-dma_unmap_sg-nents-value.patch
|
||||
patches.suse/iommu-vt-d-Fix-__domain_mapping-s-usage-of-switch_to.patch
|
||||
patches.suse/firewire-core-fix-overlooked-update-of-subsystem-ABI.patch
|
||||
@@ -34681,6 +34684,7 @@
|
||||
patches.suse/IB-mlx5-Fix-obj_type-mismatch-for-SRQ-event-subscrip.patch
|
||||
patches.suse/cpufreq-Initialize-cpufreq-based-invariance-before-subsys.patch
|
||||
patches.suse/arm64-dts-imx8mp-Correct-thermal-sensor-index.patch
|
||||
patches.suse/crypto-af_alg-Fix-incorrect-boolean-values-in-af_alg.patch
|
||||
patches.suse/tracing-dynevent-Add-a-missing-lockdown-check-on-dynevent.patch
|
||||
patches.suse/vhost-Take-a-reference-on-the-task-in-struct-vhost_t.patch
|
||||
patches.suse/Bluetooth-hci_sync-Fix-hci_resume_advertising_sync.patch
|
||||
@@ -35438,6 +35442,7 @@
|
||||
patches.suse/cpuidle-menu-Use-residency-threshold-in-polling-state-override-decisions.patch
|
||||
patches.suse/KEYS-trusted-Fix-a-memory-leak-in-tpm2_load_cmd.patch
|
||||
patches.suse/ima-Handle-error-code-returned-by-ima_filter_rule_ma.patch
|
||||
patches.suse/crypto-af_alg-zero-initialize-memory-allocated-via-s.patch
|
||||
patches.suse/crypto-authenc-Correctly-pass-EINPROGRESS-back-up-to.patch
|
||||
patches.suse/crypto-asymmetric_keys-prevent-overflow-in-asymmetri.patch
|
||||
patches.suse/crypto-hisilicon-qm-restore-original-qos-values.patch
|
||||
@@ -35620,18 +35625,24 @@
|
||||
patches.suse/msft-hv-3440-net-hv_netvsc-reject-RSS-hash-key-programming-withou.patch
|
||||
patches.suse/ipv6-Fix-use-after-free-in-inet6_addr_del.patch
|
||||
patches.suse/net-sched-sch_qfq-do-not-free-existing-class-in-qfq_.patch
|
||||
patches.suse/btrfs-send-check-for-inline-extents-in-range_is_hole.patch
|
||||
patches.suse/btrfs-reject-new-transactions-if-the-fs-is-fully-rea.patch
|
||||
patches.suse/net-sched-Enforce-that-teql-can-only-be-used-as-root.patch
|
||||
patches.suse/x86-make-page-fault-handling-disable-interrupts-prop.patch
|
||||
patches.suse/crypto-authencesn-reject-too-short-AAD-assoclen-8-to.patch
|
||||
patches.suse/ALSA-usb-audio-Fix-use-after-free-in-snd_usb_mixer_f.patch
|
||||
patches.suse/clocksource-Reduce-watchdog-readout-delay-limit-to-p.patch
|
||||
patches.suse/msft-hv-3448-scsi-storvsc-Process-unsupported-MODE_SENSE_10.patch
|
||||
patches.suse/btrfs-do-not-strictly-require-dirty-metadata-thresho.patch
|
||||
patches.suse/macvlan-fix-error-recovery-in-macvlan_common_newlink.patch
|
||||
patches.suse/ALSA-aloop-Fix-racy-access-at-PCM-trigger.patch
|
||||
patches.suse/spi-tegra210-quad-Return-IRQ_HANDLED-when-timeout-already-.patch
|
||||
patches.suse/spi-tegra210-quad-Move-curr_xfer-read-inside-spinlock.patch
|
||||
patches.suse/spi-tegra210-quad-Protect-curr_xfer-assignment-in-tegra_qs.patch
|
||||
patches.suse/spi-tegra210-quad-Protect-curr_xfer-in-tegra_qspi_combined.patch
|
||||
patches.suse/spi-tegra210-quad-Protect-curr_xfer-clearing-in-tegra_qspi.patch
|
||||
patches.suse/spi-tegra210-quad-Protect-curr_xfer-check-in-IRQ-handler.patch
|
||||
patches.suse/macvlan-observe-an-RCU-grace-period-in-macvlan_commo.patch
|
||||
|
||||
# netdev/net-next main
|
||||
patches.suse/ice-use-netif_get_num_default_rss_queues.patch
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
2026-02-21 00:32:15 +0000
|
||||
GIT Revision: baf4c488af6bfa6b842c91bee4aec8becbfb31ec
|
||||
2026-02-26 00:30:49 +0000
|
||||
GIT Revision: 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
|
||||
GIT Branch: SLE15-SP6-LTSS
|
||||
|
||||
Reference in New Issue
Block a user