Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP2:Update
patchinfo.27693
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.27693
<patchinfo incident="27693"> <issue id="1203183" tracker="bnc">Problems with IPv6 with large messages on OPA fabrics</issue> <issue id="1203693" tracker="bnc">kernel-default failed to build for aarch64</issue> <issue id="1203740" tracker="bnc">NFS4ERR_OLD_STATEID in response to WRITE is not handled well</issue> <issue id="1204171" tracker="bnc">VUL-0: CVE-2022-3435: kernel: out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c</issue> <issue id="1204614" tracker="bnc">VUL-0: CVE-2022-42432: kernel-source-rt,kernel-source-azure,kernel-source: nftables: leak of stale stack data to userspace via nf_osf_find()</issue> <issue id="1204760" tracker="bnc">SCTP sysctl parameters get boundaries from host instead of net ns — ref:_00D1igLOd._5005qEDqV7:ref</issue> <issue id="1205149" tracker="bnc">%kernel_module_package_buildreqs needs to require suse-kernel-rpm-scriptlets</issue> <issue id="1206073" tracker="bnc">VUL-0: CVE-2022-3564: kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c</issue> <issue id="1206113" tracker="bnc">VUL-0: CVE-2022-3643: xen: Guests can trigger NIC interface reset/abort/crash via netback (XSA-423)</issue> <issue id="1206114" tracker="bnc">VUL-0: CVE-2022-42328, CVE-2022-42329: xen: Guests can trigger deadlock in Linux netback driver (XSA-424)</issue> <issue id="1206314" tracker="bnc">VUL-0: CVE-2022-3564: kernel live patch: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c</issue> <issue id="1206389" tracker="bnc">VUL-0: CVE-2022-3108: kernel: kmemdup's return value not checked</issue> <issue id="1206393" tracker="bnc">VUL-0: CVE-2022-3115: kernel: Unchecked kzalloc return leads to null pointer dereference</issue> <issue id="1206395" tracker="bnc">VUL-0: CVE-2022-3107: kernel: Unchecked kvmalloc_array return leads to null pointer dereference</issue> <issue id="1206398" tracker="bnc">VUL-0: CVE-2022-3105: kernel: uapi_finalize's return value not checked leading to null pointer dereference</issue> <issue id="1206399" tracker="bnc">VUL-0: CVE-2022-3112: kernel: kzalloc's return value not checked leading to null pointer dereference</issue> <issue id="1206515" tracker="bnc">VUL-0: CVE-2022-47520: kernel-source-rt,kernel-source,kernel-source-azure: WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN)</issue> <issue id="1206664" tracker="bnc">VUL-0: CVE-2022-4662: kernel-source-azure,kernel-source-rt,kernel-source: Recursive locking violation in usb-storage that can cause the kernel to deadlock</issue> <issue id="1206677" tracker="bnc">VUL-0: kernel-source: sctp_diag: fix type confusion in inet_diag_msg_sctpasoc_fill()</issue> <issue id="1206784" tracker="bnc">VUL-0: kernel-source: HID: drop assumptions on non-empty lists</issue> <issue id="1207036" tracker="bnc">VUL-0: CVE-2023-23454: kernel: type-confusion in the CBQ network scheduler</issue> <issue id="1207125" tracker="bnc">VUL-0: CVE-2023-23455: kernel: type-confusion in the ATM network scheduler</issue> <issue id="1207134" tracker="bnc">VUL-0: CVE-2023-0266: kernel-source,kernel-source-rt,kernel-source-azure: Missing locks in SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 compat code causing UAF used in the wild</issue> <issue id="1207186" tracker="bnc">VUL-0: kernel-source,kernel-source-rt,kernel-source-azure: HID: betop: check shape of output reports</issue> <issue id="1207188" tracker="bnc">VUL-0: CVE-2023-23454: kernel live patch: type-confusion in the CBQ network scheduler</issue> <issue id="1207189" tracker="bnc">VUL-0: CVE-2023-23455: kernel live patch: type-confusion in the ATM network scheduler</issue> <issue id="1207190" tracker="bnc">VUL-0: CVE-2023-0266: kernel live patch: Missing locks in SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 compat code causing UAF used in the wild</issue> <issue id="1207237" tracker="bnc">VUL-0: CVE-2022-47929: kernel-source,kernel-source-rt,kernel-source-azure: NULL pointer dereference bug in the traffic control subsystem</issue> <issue id="1207769" tracker="bnc">VUL-0: kernel: NULL ptr in show_smaps_rollup</issue> <issue id="1207823" tracker="bnc">VUL-0: CVE-2022-47520: kernel live patch: WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN)</issue> <issue id="2023-0266" tracker="cve" /> <issue id="2022-47929" tracker="cve" /> <issue id="2023-23454" tracker="cve" /> <issue id="2023-23455" tracker="cve" /> <issue id="2022-3435" tracker="cve" /> <issue id="2022-4662" tracker="cve" /> <issue id="2022-3115" tracker="cve" /> <issue id="2022-47520" tracker="cve" /> <issue id="2022-3112" tracker="cve" /> <issue id="2022-3564" tracker="cve" /> <issue id="2022-3108" tracker="cve" /> <issue id="2022-3105" tracker="cve" /> <issue id="2022-3107" tracker="cve" /> <issue id="2022-42328" tracker="cve" /> <issue id="2022-42329" tracker="cve" /> <issue id="2022-3643" tracker="cve" /> <issue id="PED-1706" tracker="jsc" /> <category>security</category> <rating>important</rating> <packager>jdelvare</packager> <reboot_needed/> <description>The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125). - CVE-2023-23454: Fixed denial or service in cbq_classify in net/sched/sch_cbq.c (bnc#1207036). - CVE-2023-0266: Fixed a use-after-free vulnerability inside the ALSA PCM package. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 was missing locks that could have been used in a use-after-free that could have resulted in a priviledge escalation to gain ring0 access from the system user (bsc#1207134). - CVE-2022-47929: Fixed NULL pointer dereference bug in the traffic control subsystem (bnc#1207237). - CVE-2022-47520: Fixed a out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet in the WILC1000 wireless driver (bsc#1206515). - CVE-2022-4662: Fixed incorrect access control in the USB core subsystem that could lead a local user to crash the system (bnc#1206664). - CVE-2022-42328, CVE-2022-42329: Fixed deadlock inside the netback driver that could have been triggered from a VM guest (bnc#1206114). - CVE-2022-3643: Fixed reset/abort/crash via netback from VM guest (bnc#1206113). - CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth component (bnc#1206073). - CVE-2022-3435: Fixed a out-of-bounds read in function fib_nh_match of the file net/ipv4/fib_semantics.c. It is possible to initiate the attack remotely (bnc#1204171). - CVE-2022-3115: Fixed a null pointer dereference inside malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c that lacked a check of the return value of kzalloc() (bnc#1206393). - CVE-2022-3112: Fixed a null pointer dereference in amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c that lacked a check of the return value of kzalloc() (bnc#1206399). - CVE-2022-3108: Fixed missing check of return value of kmemdup() (bnc#1206389). - CVE-2022-3107: Fixed missing check of return value of kvmalloc_array() (bnc#1206395). - CVE-2022-3105: Fixed missing check of kmalloc_array() in uapi_finalize in drivers/infiniband/core/uverbs_uapi.c (bnc#1206398). The following non-security bugs were fixed: - HID: betop: check shape of output reports (git-fixes, bsc#1207186). - HID: check empty report_list in bigben_probe() (git-fixes, bsc#1206784). - HID: check empty report_list in hid_validate_values() (git-fixes, bsc#1206784). - NFS: Handle missing attributes in OPEN reply (bsc#1203740). - constraints: increase disk space for all architectures (bsc#1203693). - ipv6: ping: fix wrong checksum for large frames (bsc#1203183). - mm: /proc/pid/smaps_rollup: fix no vma's null-deref (bsc#1207769). - net: sched: atm: dont intepret cls results when asked to drop (bsc#1207036). - net: sched: cbq: dont intepret cls results when asked to drop (bsc#1207036). - netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find() (bsc#1204614). - rpm: suse-kernel-rpm-scriptlets to kmp buildreqs (boo#1205149). - sctp: fail if no bound addresses can be used for a given scope (bsc#1206677). - sctp: sysctl: make extra pointers netns aware (bsc#1204760). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor