1TASK


4.19.90-2208.1.0~1...4.19.90-2208.2.0


TASK COMMIT
bugzilla: #I5J9R4:CVE-2022-36946 800dcea07383 netfilter: nf_queue: do not allow packet truncation below transport header offset
bugzilla: #I5KKF2:CVE-2022-2639 0947a6782e3e openvswitch: fix OOB access in reserve_sfa_size()
bugzilla: #I5KSEX:【openEuler 1.0-LTS】回合主线补丁 dm thin: use refcount_t for thin_c reference counting 8719ee2df3ae dm thin: use refcount_t for thin_c reference counting
bugzilla: #I5IGTA:【openeuler sp1】【arm/x86】update_0719版本ltp执行用例execve06失败 72b32d44b3ab exec: Force single empty string when argv is empty
bugzilla: #I5KBY1:【openEuler-1.0-LTS】usb: gadget: rndis: prevent integer overflow in rndis_set_response() e323c9883812 usb: gadget: rndis: prevent integer overflow in rndis_set_response()
bugzilla: #I5I4FP:【openEuler-1.0-LTS】7-8月 主线/lts补丁回合 02d2d630d974 serial: pl011: UPSTAT_AUTORTS requires .throttle/unthrottle
a381471ce26f serial: 8250: fix return error code in serial8250_request_std_resource()
e05bdf1981c7 ipv4: Fix data-races around sysctl_ip_dynaddr.
18c37308e5b1 icmp: Fix a data-race around sysctl_icmp_ratemask.
d8bcf75f1773 icmp: Fix a data-race around sysctl_icmp_ratelimit.
dbf1141b9978 icmp: Fix data-races around sysctl.
9a58e6df7498 net: Fix data-races around sysctl_mem.
4224874762de inetpeer: Fix data-races around sysctl.
96462b8bad6f usbnet: fix memory leak in error case
bb6bcf7e3d48 esp: limit skb_page_frag_refill use to a single page
a6b132d27643 net: tun: avoid disabling NAPI twice
e930a2eced58 net: bonding: fix use-after-free after 802.3ad slave unbind
4b48e5d45746 net: bonding: fix possible NULL deref in rlb code
ac7d1e882c8b usbnet: fix memory allocation in helpers
34bba31e9713 net: tun: stop NAPI when detaching queues
96222a5c31d1 net: tun: unlink NAPI from device on destruction
c3935f76f3c1 virtio-net: fix race between ndo_open() and virtio_device_ready()
fcbbd85e481f SUNRPC: Fix READ_PLUS crasher
af3a0f9fff45 virtio_net: fix xdp_rxq_info bug after suspend/resume
41c1b6ceb305 erspan: do not assume transport header is always set
dc05e5547e8c net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms
7812163c5a4d bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
fe95c98ae633 ext4: make variable "count" signed
3074c22aa3f5 serial: 8250: Store to lsr_save_flags after lsr read
b8c1bae36abf irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
a23d74151076 irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
eed696b47acd ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
bugzilla: #I5JW9C:fix a null-ptr-deref bug for ip6_ptr 65db88fb4371 ipv6/addrconf: fix a null-ptr-deref bug for ip6_ptr
bugzilla: #I5IM3T:CVE-2022-2327 f0a1bfaed771 io_uring: add missing item types for various requests
bugzilla: #I5JNFK:[openEuler 20.03-LTS ] 网络TC模块存在内存泄漏的问题 f54991ebb6a3 net/sched: cls_u32: fix possible leak in u32_init_knode()
bugzilla: #I5JPWX:[openEuler 20.03-LTS ] 网络TC模块增加对传入的quantum的校验 15e84ac544d8 fq_codel: reject silly quantum parameters
bugzilla: #I5JPWC:[openEuler 20.03-LTS ] 网络TC模块sch_teql加载时可能引起空指针问题 92fadb6ba97e net: sched: sch_teql: fix null-pointer dereference
bugzilla: 187356, #I5KOZ5:【RCU】修复rcu callback过多导致softlockup 483432ba1de3 rcu: Set a maximum limit for back-to-back callback invocation
bugzilla: #I5JT6V:【openEuler-1.0-LTS】mm: Fix page counter mismatch in shmem_mfill_atomic_pte 454336e114b6 mm: Fix page counter mismatch in shmem_mfill_atomic_pte
bugzilla: 187287, #I5JQML:【openEuler-1.0-LTS】同步8.1长稳测试出现WARNING: bad unlock balance detected! 7888ad2c1b43 scsi: mpt3sas: Fix unlock imbalance
bugzilla: 187369, #I5K66O:io_uring: io_wqe_worker使用旧的req->work.identity->fs和chroot_fs_refs并发可能导致UAF问题 b56e643129ad io-wq: Switch io_wqe_worker's fs before releasing request
bugzilla: #I58DFB:CVE-2022-1679 650fd4ce616f ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
bugzilla: 187358, #I5KD2A:错误合入补丁导致可能出现double free问题 3b0ad06008c3 Revert "iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()"

2CVE


CVE issue
CVE-2022-1679 #I58DFB:CVE-2022-1679
CVE-2022-2327 #I5IM3T:CVE-2022-2327
CVE-2022-2639 #I5KKF2:CVE-2022-2639
CVE-2022-36946 #I5J9R4:CVE-2022-36946
CVE-2022-20423 #I5U71B:CVE-2022-20423