Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.28157
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.28157
<patchinfo incident="28157"> <issue tracker="bnc" id="1209188">VUL-0: secure boot key rotation for 202211 boothole4</issue> <issue id="1186449" tracker="bnc">acpi-cpufreq: Skip initializtion if a cpufreq driver exists</issue> <issue id="1194535" tracker="bnc">VUL-0: CVE-2021-4203: kernel-source-azure,kernel-source-rt,kernel-source: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses</issue> <issue id="1201420" tracker="bnc">VUL-0: CVE-2022-2991: kernel-source-rt,kernel-source-azure,kernel-source: heap-based overflow in the lightnvm subsystem</issue> <issue id="1203331" tracker="bnc">VUL-0: CVE-2022-38096: kernel: NULL pointer dereference found in vmwgfx driver</issue> <issue id="1203332" tracker="bnc">VUL-0: CVE-2022-36280: kernel: out-of-bounds memory access vulnerability found in vmwgfx driver</issue> <issue id="1204356" tracker="bnc">udev device scanning slow in Xen - processing SEQNUM=* is taking a long time</issue> <issue id="1204662" tracker="bnc">[15SP5][XEN] Entry into maintenance mode after boot up 15SP5 XEN kernel for AMD Zen3 test machine</issue> <issue id="1205711" tracker="bnc">VUL-0: CVE-2022-4129: kernel-source-rt,kernel-source,kernel-source-azure: kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference</issue> <issue id="1207051" tracker="bnc">Vul-0: CVE-2023-23559: kernel-source,kernel-rt,kernel-azure: Integer overflow in rndis_wlan that leads to a buffer overflow</issue> <issue id="1207773" tracker="bnc">VUL-0: CVE-2023-0045: kernel: missing Flush IBP in ib_prctl_set</issue> <issue id="1207795" tracker="bnc">VUL-0: CVE-2023-0590: kernel: use-after-free due to race condition in qdisc_graft()</issue> <issue id="1207845" tracker="bnc">VUL-0: CVE-2023-0597: kernel: x86/mm: Randomize per-cpu entry area</issue> <issue id="1207875" tracker="bnc">[Azure][MANA][IRQ] Fix IRQ Name - Add PCI And Queue Number</issue> <issue id="1208700" tracker="bnc">VUL-0: CVE-2023-26545: kernel-source-rt,kernel-source,kernel-source-azure: double free in net/mpls/af_mpls.c upon an allocation failure</issue> <issue id="1208837" tracker="bnc">VUL-0: CVE-2023-1118: kernel-source,kernel-source-azure,kernel-source-rt: UAF drivers/media/rc directory</issue> <issue id="2023-1118" tracker="cve" /> <issue id="2022-4129" tracker="cve" /> <issue id="2021-4203" tracker="cve" /> <issue id="2023-26545" tracker="cve" /> <issue id="2023-0597" tracker="cve" /> <issue id="2023-23559" tracker="cve" /> <issue id="2022-38096" tracker="cve" /> <issue id="2022-36280" tracker="cve" /> <issue id="2023-0045" tracker="cve" /> <issue id="2023-0590" tracker="cve" /> <issue id="2022-2991" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes. - CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535). - CVE-2022-2991: Fixed an heap-based overflow in the lightnvm implemenation (bsc#1201420). - CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332). - CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331). - CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711) - CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773). - CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795). - CVE-2023-0597: Fixed a lack of randomization of per-cpu entry area in x86/mm (bsc#1207845). - CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837). - CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051). - CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700). The following non-security bugs were fixed: - kabi/severities: add l2tp local symbols - module: Do not wait for GOING modules (bsc#1196058, bsc#1186449, bsc#1204356, bsc#1204662). - net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor