Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.32926
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.32926
<patchinfo incident="32926"> <issue id="1211515" tracker="bnc">Partner-L3: NVMe-oF TCP: mount mapped volumes over network latency is very slow</issue> <issue id="1213456" tracker="bnc">VUL-0: EMBARGOED: CVE-2023-28746: CPU: Register File Data Sampling</issue> <issue id="1214064" tracker="bnc">Partner-L3: tasks are not progressing due to syscall on NVME stuck - SLES 15.4</issue> <issue id="1218195" tracker="bnc">VUL-0: CVE-2023-6817: kernel: use-after-free in nft_pipapo_walk</issue> <issue id="1218216" tracker="bnc">VUL-0: CVE-2023-5197: kernel: use-after-free due to addition and removal of rules from chain bindings within the same transaction</issue> <issue id="1218562" tracker="bnc">VUL-0: CVE-2023-6270: kernel: use-after-free vulnerability in ATA over Ethernet (AoE) driver</issue> <issue id="1218915" tracker="bnc">VUL-0: CVE-2024-0607: kernel: nf_tables: pointer math issue in nft_byteorder_eval()</issue> <issue id="1219073" tracker="bnc">[mdadm] system crashed during md raid device attach/detach operations</issue> <issue id="1219126" tracker="bnc">VUL-0: CVE-2024-23850: kernel: in btrfs_get_root_ref in fs/btrfs/disk-io.c there can be an assertion failure leading to DoS</issue> <issue id="1219127" tracker="bnc">VUL-0: CVE-2024-23849: kernel: in rds_recv_track_latency in net/rds/af_rds.c an off-by-one error results in out-of bounds access</issue> <issue id="1219146" tracker="bnc">VUL-0: CVE-2024-23851: kernel: copy_params in drivers/md/dm-ioctl.c can lead to crash</issue> <issue id="1219295" tracker="bnc">VUL-0: CVE-2023-52340: kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU</issue> <issue id="1219633" tracker="bnc">L3: L3-Question: kernel workqueue and soft lockups for extended periods with NFS involved in backtraces</issue> <issue id="1219653" tracker="bnc">Enable CONFIG_GDB_SCRIPTS</issue> <issue id="1219827" tracker="bnc">VUL-0: CVE-2023-52429: kernel-source,kernel-source-azure,kernel-source-rt: potential DoS in dm_table_create in drivers/md/dm-table.c</issue> <issue id="1219835" tracker="bnc">VUL-0: CVE-2024-1151: kernel-source,kernel-source-azure,kernel-source-rt: kernel: stack overflow problem in Open vSwitch kernel module leading to DoS</issue> <issue id="1220009" tracker="bnc">VUL-1: CVE-2024-26593: kernel: i2c: i801: missing data buffer index reset could lead to a data leakage</issue> <issue id="1220140" tracker="bnc">VUL-0: CVE-2023-52439: kernel-source,kernel-source-azure,kernel-source-rt: use-after-free in uio_open</issue> <issue id="1220187" tracker="bnc">VUL-0: CVE-2024-26585: kernel-source,kernel-source-azure,kernel-source-rt: tls: race condition between tx work scheduling and socket close</issue> <issue id="1220238" tracker="bnc">VUL-0: CVE-2023-52449: kernel: mtd: Fix gluebi NULL pointer dereference caused by ftl notifier</issue> <issue id="1220240" tracker="bnc">VUL-0: CVE-2023-52443: kernel-source,kernel-source-azure,kernel-source-rt: apparmor: crash when parsed profile name is empty</issue> <issue id="1220241" tracker="bnc">VUL-0: CVE-2023-52445: kernel-source,kernel-source-azure,kernel-source-rt: media: pvrusb2: fix use after free on context disconnection</issue> <issue id="1220243" tracker="bnc">VUL-0: CVE-2024-26586: kernel-source,kernel-source-azure,kernel-source-rt: mlxsw: spectrum_acl_tcam: stack corruption via an excessive number of ACLs</issue> <issue id="1220250" tracker="bnc">VUL-0: CVE-2023-52451: kernel-source,kernel-source-azure,kernel-source-rt: powerpc/pseries/memhp: out of bounds read when doing a memory hotplug remove of an invalid address</issue> <issue id="1220251" tracker="bnc">VUL-0: CVE-2023-52447: kernel-source,kernel-source-azure,kernel-source-rt: bpf: Defer the free of inner map when necessary</issue> <issue id="1220253" tracker="bnc">VUL-0: CVE-2023-52448: kernel-source,kernel-source-azure,kernel-source-rt: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump</issue> <issue id="1220254" tracker="bnc">VUL-0: CVE-2024-26591: kernel-source,kernel-source-azure,kernel-source-rt: bpf: fix re-attachment branch in bpf_tracing_prog_attach</issue> <issue id="1220255" tracker="bnc">VUL-0: CVE-2024-26589: kernel-source,kernel-source-azure,kernel-source-rt: bpf: out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS</issue> <issue id="1220257" tracker="bnc">VUL-0: CVE-2023-52452: kernel-source,kernel-source-azure,kernel-source-rt: bpf: Fix accesses to uninit stack slots</issue> <issue id="1220326" tracker="bnc">VUL-0: CVE-2024-26598: kernel-source,kernel-source-azure,kernel-source-rt: kvm: Avoid potential UAF in LPI translation cache</issue> <issue id="1220328" tracker="bnc">VUL-0: CVE-2023-52463: kernel: efivarfs: force RO when remounting if SetVariable is not supported</issue> <issue id="1220330" tracker="bnc">VUL-0: CVE-2023-52464: kernel: EDAC/thunderx: Fix possible out-of-bounds string access</issue> <issue id="1220335" tracker="bnc">VUL-0: CVE-2024-26603: kernel: x86/fpu: user-defined xsave buffer size can lead to infinite loop via #PF handling</issue> <issue id="1220344" tracker="bnc">VUL-0: CVE-2024-26595: kernel-source,kernel-source-azure,kernel-source-rt: mlxsw: spectrum_acl_tcam: NULL pointer dereference in error path</issue> <issue id="1220350" tracker="bnc">VUL-0: CVE-2023-52457: kernel-source,kernel-source-azure,kernel-source-rt: serial 8250 omap don't skip resource freeing if pm_runtime_resume_and_get() failed</issue> <issue id="1220364" tracker="bnc">VUL-0: CVE-2023-52456: kernel-source,kernel-source-azure,kernel-source-rt: imx: fix tx statemachine deadlock</issue> <issue id="1220398" tracker="bnc">VUL-0: CVE-2024-26602: kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier</issue> <issue id="1220409" tracker="bnc">VUL-0: CVE-2019-25162: kernel-source,kernel-source-azure,kernel-source-rt: i2c: Fix a potential use after free</issue> <issue id="1220433" tracker="bnc">VUL-0: CVE-2023-52467: kernel: mfd: syscon: potential NULL pointer dereference in of_syscon_register()</issue> <issue id="1220444" tracker="bnc">VUL-0: CVE-2021-46932: kernel-source,kernel-source-azure,kernel-source-rt: input: appletouch: missing work initialization before device registration</issue> <issue id="1220457" tracker="bnc">VUL-0: CVE-2021-46923: kernel-source,kernel-source-azure,kernel-source-rt: fs/mount_setattr: always cleanup mount_kattr</issue> <issue id="1220459" tracker="bnc">VUL-0: CVE-2021-46924: kernel-source,kernel-source-azure,kernel-source-rt: NFC: st21nfca: fix memory leak in device probe and remove</issue> <issue id="1220469" tracker="bnc">VUL-0: CVE-2021-46934: kernel-source,kernel-source-azure,kernel-source-rt: i2c: wrong user data may cause warning in i2c_transfer()</issue> <issue id="1220649" tracker="bnc">VUL-0: CVE-2023-52475: kernel: Input: powermate: fix use-after-free in powermate_config_complete</issue> <issue id="1220735" tracker="bnc">VUL-0: CVE-2023-52482: kernel: x86/srso: speculative return stack overflow in Hygon processors</issue> <issue id="1220736" tracker="bnc">VUL-0: CVE-2024-26607: kernel: drm/bridge: sii902x: probing race condition leads to NULL pointer dereference</issue> <issue id="1220796" tracker="bnc">VUL-0: CVE-2023-52478: kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect</issue> <issue id="1220797" tracker="bnc">VUL-0: CVE-2023-52484: kernel: iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range</issue> <issue id="1220825" tracker="bnc">VUL-0: CVE-2024-26622: kernel: tomoyo: use after free in in tomoyo_write_control()</issue> <issue id="1220845" tracker="bnc">VUL-0: CVE-2022-48627: kernel: vt: fix memory overlapping when deleting chars in the buffer</issue> <issue id="1220917" tracker="bnc">VUL-0: CVE-2021-47083: kernel: pinctrl: mediatek: fix global-out-of-bounds issue</issue> <issue id="1220930" tracker="bnc">VUL-0: CVE-2023-52530: kernel: wifi: mac80211: fix potential key use-after-free</issue> <issue id="1220931" tracker="bnc">VUL-0: CVE-2023-52531: kernel: wifi: iwlwifi: mvm: Fix a memory corruption issue</issue> <issue id="1220933" tracker="bnc">VUL-0: CVE-2023-52559: kernel: iommu/vt-d: Avoid memory allocation in iommu_suspend()</issue> <issue id="2023-6270" tracker="cve" /> <issue id="2023-52463" tracker="cve" /> <issue id="2023-52559" tracker="cve" /> <issue id="2023-28746" tracker="cve" /> <issue id="2021-46934" tracker="cve" /> <issue id="2023-52530" tracker="cve" /> <issue id="2023-52531" tracker="cve" /> <issue id="2021-47083" tracker="cve" /> <issue id="2024-26607" tracker="cve" /> <issue id="2022-48627" tracker="cve" /> <issue id="2023-52482" tracker="cve" /> <issue id="2023-52467" tracker="cve" /> <issue id="2024-26591" tracker="cve" /> <issue id="2024-26589" tracker="cve" /> <issue id="2023-52484" tracker="cve" /> <issue id="2024-26585" tracker="cve" /> <issue id="2023-52340" tracker="cve" /> <issue id="2024-0607" tracker="cve" /> <issue id="2023-6817" tracker="cve" /> <issue id="2024-26622" tracker="cve" /> <issue id="2024-23850" tracker="cve" /> <issue id="2023-52452" tracker="cve" /> <issue id="2023-52457" tracker="cve" /> <issue id="2023-52456" tracker="cve" /> <issue id="2023-52451" tracker="cve" /> <issue id="2021-46932" tracker="cve" /> <issue id="2019-25162" tracker="cve" /> <issue id="2023-52449" tracker="cve" /> <issue id="2021-46923" tracker="cve" /> <issue id="2023-52447" tracker="cve" /> <issue id="2023-52478" tracker="cve" /> <issue id="2023-52475" tracker="cve" /> <issue id="2024-26598" tracker="cve" /> <issue id="2024-26603" tracker="cve" /> <issue id="2021-46924" tracker="cve" /> <issue id="2023-52445" tracker="cve" /> <issue id="2023-52439" tracker="cve" /> <issue id="2023-52443" tracker="cve" /> <issue id="2024-26602" tracker="cve" /> <issue id="2024-26593" tracker="cve" /> <issue id="2024-26586" tracker="cve" /> <issue id="2024-26595" tracker="cve" /> <issue id="2023-52464" tracker="cve" /> <issue id="2023-52448" tracker="cve" /> <issue id="2024-1151" tracker="cve" /> <issue id="2023-5197" tracker="cve" /> <issue id="2024-23849" tracker="cve" /> <issue id="2023-52429" tracker="cve" /> <issue id="2024-23851" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562). - CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328). - CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933). - CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456). - CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930). - CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736). - CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433). - CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254). - CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255). - CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797). - CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187). - CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295). - CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915). - CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195). - CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825). - CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126). - CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257). - CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350). - CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364). - CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250). - CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238). - CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457). - CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251). - CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326). - CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335). - CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241). - CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140). - CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240). - CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398). - CVE-2024-26593: Fixed block process call transactions (bsc#1220009). - CVE-2024-26586: Fixed stack corruption (bsc#1220243). - CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344). - CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330) - CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253). - CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835). - CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216). - CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127). - CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827). - CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146). The following non-security bugs were fixed: - bpf: Fix verification of indirect var-off stack access (git-fixes). - bpf: Guard stack limits against 32bit overflow (git-fixes). - KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes). - KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes). - NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633). - nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515). - nvme: remove nvme_alloc_request and nvme_alloc_request_qid (bsc#1214064). - nvme: start keep-alive after admin queue setup (bsc#1211515). - x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes). - x86/bugs: Add asm helpers for executing VERW (git-fixes). - x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes). - x86/entry_32: Add VERW just before userspace transition (git-fixes). - x86/entry_64: Add VERW just before userspace transition (git-fixes). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor