File _patchinfo of Package patchinfo.28134
<patchinfo incident="28134">
<issue tracker="bnc" id="1209188">VUL-0: secure boot key rotation for 202211 boothole4</issue>
<issue id="1203331" tracker="bnc">VUL-0: CVE-2022-38096: kernel: NULL pointer dereference found in vmwgfx driver</issue>
<issue id="1203332" tracker="bnc">VUL-0: CVE-2022-36280: kernel: out-of-bounds memory access vulnerability found in vmwgfx driver</issue>
<issue id="1207051" tracker="bnc">Vul-0: CVE-2023-23559: kernel-source,kernel-rt,kernel-azure: Integer overflow in rndis_wlan that leads to a buffer overflow</issue>
<issue id="1207795" tracker="bnc">VUL-0: CVE-2023-0590: kernel: use-after-free due to race condition in qdisc_graft()</issue>
<issue id="1208700" tracker="bnc">VUL-0: CVE-2023-26545: kernel-source-rt,kernel-source,kernel-source-azure: double free in net/mpls/af_mpls.c upon an allocation failure</issue>
<issue id="2023-26545" tracker="cve" />
<issue id="2023-23559" tracker="cve" />
<issue id="2022-38096" tracker="cve" />
<issue id="2022-36280" tracker="cve" />
<issue id="2023-0590" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>osalvador</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>