Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.33231
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.33231
<patchinfo incident="33231"> <issue id="1200599" tracker="bnc">VUL-0: CVE-2022-20154: kernel-source,kernel-source-rt,kernel-source-azure: race condition leading to use-after-free in lock_sock_nested</issue> <issue id="1209635" tracker="bnc">VUL-0: CVE-2022-4744: kernel: tun: avoid double free in tun_free_netdev</issue> <issue id="1212514" tracker="bnc">VUL-0: CVE-2023-35827: kernel: use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c</issue> <issue id="1213456" tracker="bnc">VUL-0: CVE-2023-28746: CPU: Register File Data Sampling</issue> <issue id="1217987" tracker="bnc">VUL-0: CVE-2023-6356: kernel: NULL pointer dereference in nvmet_tcp_build_pdu_iovec</issue> <issue id="1217988" tracker="bnc">VUL-0: CVE-2023-6535: kernel: NULL pointer dereference in nvmet_tcp_execute_request</issue> <issue id="1217989" tracker="bnc">VUL-0: CVE-2023-6536: kernel: NULL pointer dereference in __nvmet_req_complete</issue> <issue id="1220237" tracker="bnc">VUL-0: CVE-2023-52450: kernel: perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()</issue> <issue id="1220251" tracker="bnc">VUL-0: CVE-2023-52447: kernel-source,kernel-source-azure,kernel-source-rt: bpf: Defer the free of inner map when necessary</issue> <issue id="1220320" tracker="bnc">VUL-0: CVE-2023-52454: kernel: nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length</issue> <issue id="1220340" tracker="bnc">VUL-0: CVE-2024-26600: kernel: phy: ti: phy-omap-usb2: NULL pointer dereference for SRP</issue> <issue id="1220366" tracker="bnc">VUL-0: CVE-2022-48626: kernel: moxart: fix potential use-after-free on remove path</issue> <issue id="1220411" tracker="bnc">VUL-0: CVE-2023-52469: kernel-source,kernel-source-azure,kernel-source-rt: drivers/gpu/drm/amd/pm: fix a use-after-free in kv_parse_power_table</issue> <issue id="1220413" tracker="bnc">VUL-0: CVE-2023-52470: kernel-source,kernel-source-azure,kernel-source-rt: drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() to avoid null-ptr-deref</issue> <issue id="1220439" tracker="bnc">VUL-0: CVE-2021-46936: kernel-source,kernel-source-azure,kernel-source-rt: net: use-after-free in tw_timer_handler()</issue> <issue id="1220443" tracker="bnc">VUL-0: CVE-2021-46927: kernel-source,kernel-source-azure,kernel-source-rt: nitro_enclaves: reachable assertion via get_user_pages()</issue> <issue id="1220445" tracker="bnc">VUL-0: CVE-2023-52474: kernel: IB/hfi1: fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests</issue> <issue id="1220466" tracker="bnc">VUL-0: CVE-2021-46925: kernel-source,kernel-source-azure,kernel-source-rt: net/smc: fix kernel panic caused by race of smc_sock</issue> <issue id="1220478" tracker="bnc">VUL-0: CVE-2021-46926: kernel: ALSA: hda: intel-sdw-acpi: harden detection of controller</issue> <issue id="1220482" tracker="bnc">VUL-0: CVE-2021-46929: kernel: sctp: use call_rcu to free endpoint</issue> <issue id="1220484" tracker="bnc">VUL-0: CVE-2021-46930: kernel-source,kernel-source-azure,kernel-source-rt: usb: mtu3: fix list_head check warning</issue> <issue id="1220486" tracker="bnc">VUL-0: CVE-2021-46931: kernel: net/mlx5e: wrap the tx reporter dump callback to extract the sq</issue> <issue id="1220487" tracker="bnc">VUL-0: CVE-2021-46933: kernel: usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.</issue> <issue id="1220790" tracker="bnc">VUL-0: CVE-2023-52477: kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors</issue> <issue id="1220831" tracker="bnc">VUL-0: CVE-2023-52502: kernel: net: nfc: race conditions in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()</issue> <issue id="1220833" tracker="bnc">VUL-0: CVE-2023-52507: kernel: nfc: nci: invalid requested protocol can cause an out of bounds shift</issue> <issue id="1220836" tracker="bnc">VUL-0: CVE-2023-52509: kernel: ravb: use-after-free in ravb_tx_timeout_work()</issue> <issue id="1220839" tracker="bnc">VUL-0: CVE-2023-52567: kernel: serial: 8250_port: NULL pointer dereference when using IRQ polling</issue> <issue id="1220840" tracker="bnc">VUL-0: CVE-2023-52525: kernel: wifi: mwifiex: invalid out-of-bounds check condition in mwifiex_process_rx_packet()</issue> <issue id="1220843" tracker="bnc">VUL-0: CVE-2023-52528: kernel: net: usb: smsc75xx: uninit-value access in __smsc75xx_read_reg()</issue> <issue id="1220870" tracker="bnc">VUL-0: CVE-2023-52574: kernel: team: fix null-ptr-deref when team device type is changed</issue> <issue id="1220871" tracker="bnc">VUL-0: CVE-2023-52575: kernel: x86/srso: Fix SBPB enablement for spec_rstack_overflow=off</issue> <issue id="1220872" tracker="bnc">VUL-0: CVE-2023-52576: kernel: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()</issue> <issue id="1220878" tracker="bnc">VUL-0: CVE-2023-52582: kernel: netfs: Only call folio_start_fscache() one time for each folio</issue> <issue id="1220879" tracker="bnc">VUL-0: CVE-2023-52497: kernel: erofs: fix lz4 inplace decompression</issue> <issue id="1220885" tracker="bnc">VUL-0: CVE-2023-52501: kernel: ring-buffer: Do not attempt to read past "commit"</issue> <issue id="1220898" tracker="bnc">VUL-0: CVE-2023-52510: kernel: ieee802154: ca8210: potential UAF in ca8210_probe()</issue> <issue id="1220918" tracker="bnc">VUL-0: CVE-2023-52569: kernel: btrfs: remove BUG() after failure to insert delayed dir index item</issue> <issue id="1220920" tracker="bnc">VUL-0: CVE-2023-52519: kernel: HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit</issue> <issue id="1220921" tracker="bnc">VUL-0: CVE-2023-52520: kernel: platform/x86: think-lmi: Fix reference leak</issue> <issue id="1220926" tracker="bnc">VUL-0: CVE-2023-52523: kernel: bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets</issue> <issue id="1220927" tracker="bnc">VUL-0: CVE-2023-52524: kernel: net: nfc: llcp: Add lock when modifying device list</issue> <issue id="1220929" tracker="bnc">VUL-0: CVE-2023-52529: kernel: HID: sony: Fix a potential memory leak in sony_probe()</issue> <issue id="1220932" tracker="bnc">VUL-0: CVE-2023-52532: kernel: net: mana: Fix TX CQE error handling</issue> <issue id="1220938" tracker="bnc">VUL-0: CVE-2023-52564: kernel: Revert &#34;tty: n_gsm: fix UAF in gsm_cleanup_mux&#34;</issue> <issue id="1220940" tracker="bnc">VUL-0: CVE-2023-52566: kernel: nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()</issue> <issue id="1220954" tracker="bnc">VUL-0: CVE-2021-47087: kernel: tee: optee: Fix incorrect page free bug</issue> <issue id="1220955" tracker="bnc">VUL-0: CVE-2021-47099: kernel: veth: shared skbs in veth device may trigger BUG assertion if GRO is enabled</issue> <issue id="1220959" tracker="bnc">VUL-0: CVE-2021-47091: kernel: mac80211: fix locking in ieee80211_start_ap error path</issue> <issue id="1220960" tracker="bnc">VUL-0: CVE-2021-47104: kernel: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()</issue> <issue id="1220961" tracker="bnc">VUL-0: CVE-2021-47105: kernel: ice: xsk: return xsk buffers back to pool when cleaning the ring</issue> <issue id="1220965" tracker="bnc">VUL-0: CVE-2021-47107: kernel: NFSD: Fix READDIR buffer overflow If a client sends a READDIR count argument that is too small (say, zero), ...</issue> <issue id="1220969" tracker="bnc">VUL-0: CVE-2021-47082: kernel: tun: avoid double free in tun_free_netdev</issue> <issue id="1220978" tracker="bnc">VUL-0: CVE-2021-47093: kernel: platform/x86: intel_pmc_core: fix memleak on registration failure</issue> <issue id="1220979" tracker="bnc">VUL-0: CVE-2021-47095: kernel: ipmi: ssif: initialize ssif_info->client early</issue> <issue id="1220981" tracker="bnc">VUL-0: CVE-2021-47096: kernel: ALSA: rawmidi - fix the uninitalized user_pversion</issue> <issue id="1220982" tracker="bnc">VUL-0: CVE-2021-47097: kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()</issue> <issue id="1220983" tracker="bnc">VUL-0: CVE-2021-47098: kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations</issue> <issue id="1220985" tracker="bnc">VUL-0: CVE-2021-47100: kernel: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module</issue> <issue id="1220986" tracker="bnc">VUL-0: CVE-2021-47108: kernel: drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf</issue> <issue id="1220987" tracker="bnc">VUL-0: CVE-2021-47101: kernel: asix: fix uninit-value in asix_mdio_read()</issue> <issue id="1220989" tracker="bnc">VUL-0: CVE-2022-48629: kernel: crypto: qcom-rng - ensure buffer for generate is completely filled</issue> <issue id="1220990" tracker="bnc">VUL-0: CVE-2022-48630: kernel: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ</issue> <issue id="1221009" tracker="bnc">VUL-0: CVE-2021-47102: kernel: net: marvell: prestera: fix incorrect structure access</issue> <issue id="1221012" tracker="bnc">VUL-0: CVE-2023-52511: kernel: spi: sun6i: reduce DMA RX transfer width to single byte</issue> <issue id="1221015" tracker="bnc">VUL-0: CVE-2023-52508: kernel: nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()</issue> <issue id="1221022" tracker="bnc">VUL-0: CVE-2023-52513: kernel: RDMA/siw: Fix connection failure handling</issue> <issue id="1221039" tracker="bnc">VUL-0: REJECTED: CVE-2023-52605: kernel: ACPI: extlog: potential NULL pointer dereference in extlog_exit()</issue> <issue id="1221040" tracker="bnc">VUL-0: CVE-2023-52597: kernel: KVM: s390: interrupt during guest fpc value test may lead to corrupted userspace registers</issue> <issue id="1221048" tracker="bnc">VUL-0: CVE-2023-52515: kernel: RDMA/srp: Do not call scsi_done() from srp_abort()</issue> <issue id="1221055" tracker="bnc">VUL-0: CVE-2023-52517: kernel: spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain</issue> <issue id="1221058" tracker="bnc">VUL-0: CVE-2023-52583: kernel: ceph: fix deadlock or deadcode of misusing dget()</issue> <issue id="1221077" tracker="bnc">rpm cannot handle filenames with spaces in package</issue> <issue id="1221276" tracker="bnc">VUL-0: CVE-2023-52492: kernel: dmaengine: fix NULL pointer in channel unregistration function</issue> <issue id="1221551" tracker="bnc">VUL-0: CVE-2021-47094: kernel: KVM: x86/mmu: don't advance iterator after restart due to yielding</issue> <issue id="1221553" tracker="bnc">VUL-0: CVE-2023-52504: kernel: x86/alternatives: Disable KASAN in apply_alternatives()</issue> <issue id="1221725" tracker="bnc">VUL-0: CVE-2024-25742, CVE-2024-25743: kernel: insufficient validation during #VC instruction emulation</issue> <issue id="1222073" tracker="bnc">VUL-0: CVE-2023-52621: kernel: bpf: check rcu_read_lock_trace_held() before calling bpf map helpers</issue> <issue id="1222619" tracker="bnc">VUL-0: kernel: tty/n_gsm: 0day with exploit dropped on Github</issue> <issue id="2024-25742" tracker="cve" /> <issue id="2023-52519" tracker="cve" /> <issue id="2023-52529" tracker="cve" /> <issue id="2023-52474" tracker="cve" /> <issue id="2023-52513" tracker="cve" /> <issue id="2023-52515" tracker="cve" /> <issue id="2023-52564" tracker="cve" /> <issue id="2023-52447" tracker="cve" /> <issue id="2023-52621" tracker="cve" /> <issue id="2023-52510" tracker="cve" /> <issue id="2023-52524" tracker="cve" /> <issue id="2023-52528" tracker="cve" /> <issue id="2023-52507" tracker="cve" /> <issue id="2023-52566" tracker="cve" /> <issue id="2023-52508" tracker="cve" /> <issue id="2023-6535" tracker="cve" /> <issue id="2023-6536" tracker="cve" /> <issue id="2023-6356" tracker="cve" /> <issue id="2023-52454" tracker="cve" /> <issue id="2023-52520" tracker="cve" /> <issue id="2023-35827" tracker="cve" /> <issue id="2023-52509" tracker="cve" /> <issue id="2023-52501" tracker="cve" /> <issue id="2023-52567" tracker="cve" /> <issue id="2023-52517" tracker="cve" /> <issue id="2023-52511" tracker="cve" /> <issue id="2023-52525" tracker="cve" /> <issue id="2023-52504" tracker="cve" /> <issue id="2023-52575" tracker="cve" /> <issue id="2022-48626" tracker="cve" /> <issue id="2022-48629" tracker="cve" /> <issue id="2022-48630" tracker="cve" /> <issue id="2021-46926" tracker="cve" /> <issue id="2021-47096" tracker="cve" /> <issue id="2021-47104" tracker="cve" /> <issue id="2021-47097" tracker="cve" /> <issue id="2021-47094" tracker="cve" /> <issue id="2021-47107" tracker="cve" /> <issue id="2021-47101" tracker="cve" /> <issue id="2021-47108" tracker="cve" /> <issue id="2021-47098" tracker="cve" /> <issue id="2021-47100" tracker="cve" /> <issue id="2021-47095" tracker="cve" /> <issue id="2021-47091" tracker="cve" /> <issue id="2021-46936" tracker="cve" /> <issue id="2021-47102" tracker="cve" /> <issue id="2021-46925" tracker="cve" /> <issue id="2021-46927" tracker="cve" /> <issue id="2021-47093" tracker="cve" /> <issue id="2022-20154" tracker="cve" /> <issue id="2021-46929" tracker="cve" /> <issue id="2021-47087" tracker="cve" /> <issue id="2022-4744" tracker="cve" /> <issue id="2021-47082" tracker="cve" /> <issue id="2021-46933" tracker="cve" /> <issue id="2021-46930" tracker="cve" /> <issue id="2021-47099" tracker="cve" /> <issue id="2023-52492" tracker="cve" /> <issue id="2023-52450" tracker="cve" /> <issue id="2023-28746" tracker="cve" /> <issue id="2023-52583" tracker="cve" /> <issue id="2023-52582" tracker="cve" /> <issue id="2023-52477" tracker="cve" /> <issue id="2023-52470" tracker="cve" /> <issue id="2023-52469" tracker="cve" /> <issue id="2023-52576" tracker="cve" /> <issue id="2024-26600" tracker="cve" /> <issue id="2023-52497" tracker="cve" /> <issue id="2023-52605" tracker="cve" /> <issue id="2023-52569" tracker="cve" /> <issue id="2023-52502" tracker="cve" /> <issue id="2023-52574" tracker="cve" /> <issue id="2023-52597" tracker="cve" /> <issue id="2023-52523" tracker="cve" /> <issue id="2021-47105" tracker="cve" /> <issue id="2023-52532" tracker="cve" /> <issue id="2021-46931" tracker="cve" /> <issue id="PED-5759" tracker="jsc" /> <category>security</category> <rating>important</rating> <packager>rhopkins</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725). - CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc (bsc#1220920). - CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929). - CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445). - CVE-2023-52513: Fixed connection failure handling in RDMA/siw (bsc#1221022). - CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048). - CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux() (bsc#1220938). - CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251). - CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898). - CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927). - CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843). - CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833). - CVE-2023-52566: Fixed potential use after free in nilfs_gccache_submit_read_data() (bsc#1220940). - CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015). - CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). - CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). - CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). - CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320). - CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi (bsc#1220921). - CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514). - CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836). - CVE-2023-52501: Fixed possible memory corruption in ring-buffer (bsc#1220885). - CVE-2023-52567: Fixed possible Oops in serial/8250_port: when using IRQ polling (irq = 0) (bsc#1220839). - CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO drain in spi/sun6i (bsc#1221055). - CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012). - CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet() (bsc#1220840). - CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a 5-level paging machine (bsc#1221553). - CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871). - CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366). - CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989). - CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in crypto: qcom-rng (bsc#1220990). - CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-acpi (bsc#1220478). - CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi (bsc#1220981). - CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960). - CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982). - CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551). - CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965). - CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987). - CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in drm/mediatek (bsc#1220986). - CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations hwmon: (lm90) (bsc#1220983). - CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985). - CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979). - CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path (bsc#1220959). - CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439). - CVE-2021-47102: Fixed incorrect structure access In line: upper = info->upper_dev in net/marvell/prestera (bsc#1221009). - CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466). - CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use get_user_pages_unlocked() (bsc#1220443). - CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core (bsc#1220978). - CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599). - CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump() (bsc#1220482). - CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954). - CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635). - CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969). - CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487). - CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484). - CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are cloned (bsc#1220955). - CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276). - CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology() (bsc#1220237). - CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456). - CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058). - CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878). - CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790). - CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413). - CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411). - CVE-2023-52576: Fixed potential use after free in memblock_isolate_range() (bsc#1220872). - CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340). - CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879). - CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039) - CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918). - CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831). - CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870). - CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040). - CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf (bsc#1220926). - CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961). - CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932). - CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486). The following non-security bugs were fixed: - doc/README.SUSE: Update information about module support status (jsc#PED-5759) - tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor