Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP2:Update
patchinfo.31302
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.31302
<patchinfo incident="31302"> <issue id="1208995" tracker="bnc">VUL-0: CVE-2023-1192: kernel: use-after-free in smb2_is_status_io_timeout()</issue> <issue id="1210169" tracker="bnc">VUL-1: CVE-2023-1859: kernel-source,kernel-source-rt,kernel-source-azure: use after free in xen_9pfs_front_remove() due to race condition</issue> <issue id="1210778" tracker="bnc">VUL-0: CVE-2023-31085: kernel: drivers/mtd/ubi/cdev.c has a divide-by-zero error in do_div(sz,mtd->erasesize)</issue> <issue id="1212703" tracker="bnc">VUL-0: CVE-2023-1206: kernel-source-rt,kernel-source,kernel-source-azure: hash collisions in the IPv6 connection lookup table</issue> <issue id="1214233" tracker="bnc">VUL-0: CVE-2023-40283: kernel-source,kernel-source-azure,kernel-source-rt: use after free in l2cap_sock_ready_cb() due to insufficient cleanup</issue> <issue id="1214380" tracker="bnc">Incorrect CONFIG_BUILTIN_RETURN_ADDRESS_STRIPS_PAC for arm64 with 6.4 kernel and gcc7</issue> <issue id="1214386" tracker="bnc">Cannot build KMP subpackage as unsupported</issue> <issue id="1215115" tracker="bnc">VUL-0: CVE-2023-4623: kernel-source-azure,kernel-source,kernel-source-rt: net/sched UAF in sch_hfsc</issue> <issue id="1215117" tracker="bnc">VUL-0: CVE-2023-4622: kernel-source,kernel-source-azure,kernel-source-rt: af_unix UAF</issue> <issue id="1215221" tracker="bnc">VUL-0: CVE-2023-4881: kernel-source: stack out-of-bounds write in nft_exthdr ip/tcp/sctp functions</issue> <issue id="1215275" tracker="bnc">VUL-0: CVE-2023-4921: kernel: use-after-free in net/sched: sch_qfq component</issue> <issue id="1215299" tracker="bnc">VUL-0: CVE-2020-36766: kernel-source,kernel-source-azure,kernel-source-rt: kernel memory leak in cec_adap_g_log_addrs()</issue> <issue id="1215467" tracker="bnc">VUL-0: CVE-2023-42754: kernel: null pointer dereference in Linux kernel ipv4 stack</issue> <issue id="1215745" tracker="bnc">VUL-0: CVE-2023-34324: xen: Possible deadlock in Linux kernel event handling (XSA-441)</issue> <issue id="1215858" tracker="bnc">VUL-0: CVE-2023-39192: kernel-source,kernel-source-azure,kernel-source-rt: out of bounds read in u32_match_it()</issue> <issue id="1215860" tracker="bnc">VUL-0: CVE-2023-39193: kernel: Linux Kernel Netfilter Xtables Out-Of-Bounds Read Information Disclosure Vulnerability</issue> <issue id="1215861" tracker="bnc">VUL-0: CVE-2023-39194: kernel: Linux Kernel XFRM Out-Of-Bounds Read Information Disclosure Vulnerability</issue> <issue id="1216046" tracker="bnc">VUL-0: CVE-2023-39189: kernel: nftables out-of-bounds read in nf_osf_match_one()</issue> <issue id="1216051" tracker="bnc">VUL-0: CVE-2023-45862: kernel: malicious USB storage device can overwrite a buffer on the heap, upstream ce33e64c1788</issue> <issue id="2023-31085" tracker="cve" /> <issue id="2023-45862" tracker="cve" /> <issue id="2023-34324" tracker="cve" /> <issue id="2023-39189" tracker="cve" /> <issue id="2023-39194" tracker="cve" /> <issue id="2023-39193" tracker="cve" /> <issue id="2023-39192" tracker="cve" /> <issue id="2023-42754" tracker="cve" /> <issue id="2023-1206" tracker="cve" /> <issue id="2023-4921" tracker="cve" /> <issue id="2023-4622" tracker="cve" /> <issue id="2023-4623" tracker="cve" /> <issue id="2020-36766" tracker="cve" /> <issue id="2023-1859" tracker="cve" /> <issue id="2023-4881" tracker="cve" /> <issue id="2023-40283" tracker="cve" /> <issue id="2023-1192" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS. (bsc#1210778) - CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051) - CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745). - CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046) - CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861). - CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860). - CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858). - CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467). - CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703). - CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275). - CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117). - CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115). - CVE-2020-36766: Fixed a potential information leak in in the CEC driver (bsc#1215299). - CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169). - CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221). - CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233). - CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995). The following non-security bugs were fixed: - check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does. - mkspec: Allow unsupported KMPs (bsc#1214386) - old-flavors: Drop 2.6 kernels. 2.6 based kernels are EOL, upgrading from them is no longer suported. </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor