Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP5:Update
patchinfo.28803
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.28803
<patchinfo incident="28803"> <issue id="1076830" tracker="bnc">[TRACKERBUG] SLE15 networking core base fixes</issue> <issue id="1194535" tracker="bnc">VUL-0: CVE-2021-4203: kernel-source-azure,kernel-source-rt,kernel-source: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses</issue> <issue id="1202353" tracker="bnc">kernel: replace mkinitrd wrapper with native dracut</issue> <issue id="1205128" tracker="bnc">VUL-0: CVE-2022-43945: kernel-source-azure,kernel-source,kernel-source-rt: nfsd: buffer overflow due to incorrect calculation of send buffer size</issue> <issue id="1207036" tracker="bnc">VUL-0: CVE-2023-23454: kernel: type-confusion in the CBQ network scheduler</issue> <issue id="1207125" tracker="bnc">VUL-0: CVE-2023-23455: kernel: type-confusion in the ATM network scheduler</issue> <issue id="1207168" tracker="bnc">VUL-0: CVE-2023-0394: kernel: null pointer dereference in skb_transport_offset</issue> <issue id="1207185" tracker="bnc">L3: Azure - RCA - Kernel panic due to mlx5_core driver issue - SFSC 00504800 - ref:_00D1igLOd._5005qJPzAo:ref</issue> <issue id="1207795" tracker="bnc">VUL-0: CVE-2023-0590: kernel: use-after-free due to race condition in qdisc_graft()</issue> <issue id="1207845" tracker="bnc">VUL-0: CVE-2023-0597: kernel: x86/mm: Randomize per-cpu entry area</issue> <issue id="1208179" tracker="bnc">Uninstall of RPM fails in %preun section</issue> <issue id="1208333" tracker="bnc">Possible change to kABI causing kernel BUG at ../lib/nlattr.c:164!</issue> <issue id="1208599" tracker="bnc">VUL-0: CVE-2023-1076: kernel: incorrect UID assigned to tun/tap sockets</issue> <issue id="1208777" tracker="bnc">VUL-0: CVE-2023-1095: kernel: netfilter - NULL pointer dereference in nf_tables due to zeroed list head</issue> <issue id="1208837" tracker="bnc">VUL-0: CVE-2023-1118: kernel-source,kernel-source-azure,kernel-source-rt: UAF drivers/media/rc directory</issue> <issue id="1208850" tracker="bnc">VUL-0: CVE-2022-20567: kernel-source,kernel-source-azure,kernel-source-rt: race in pppol2tp_release()</issue> <issue id="1209008" tracker="bnc">VUL-0: kernel-vanilla: signed by SUSE key not locked down</issue> <issue id="1209052" tracker="bnc">VUL-0: CVE-2023-28464: kernel-source: double free in hci_conn_cleanup()</issue> <issue id="1209256" tracker="bnc">prlimit: do_prlimit needs to have a speculation check</issue> <issue id="1209289" tracker="bnc">VUL-0: CVE-2023-1390: kernel: remote DoS in TIPC kernel module</issue> <issue id="1209291" tracker="bnc">VUL-0: CVE-2023-28328: kernel: A denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c</issue> <issue id="1209532" tracker="bnc">VUL-0: CVE-2023-1513: kernel: kvm: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems</issue> <issue id="1209547" tracker="bnc">VUL-0: CVE-2017-5753: kernel-source,kernel-source-rt,kernel-source-azure: Upstream reports spectre V1 vulnerability on netlink</issue> <issue id="1209549" tracker="bnc">VUL-0: CVE-2023-28772: kernel-source,kernel-source-rt,kernel-souce-azure: Upstream reports buffer overflow in seq_buf_putmem_hex()</issue> <issue id="1209613" tracker="bnc">VUL-0: CVE-2020-36691: kernel-source,kernel-source-azure,kernel-source-rt: Using netlink to force a CPU into an eternal loop</issue> <issue id="1209687" tracker="bnc">VUL-0: CVE-2023-1611: kernel: race between quota disable and quota assign ioctls in fs/btrfs/ioctl.c</issue> <issue id="1209777" tracker="bnc">VUL-0: CVE-2020-36691: kernel: lib/nlattr.c allows attackers to cause a denial of service</issue> <issue id="1209778" tracker="bnc">VUL-0: CVE-2021-3923: kernel: stack information leak in infiniband RDMA</issue> <issue id="1209845" tracker="bnc">L3: kernel NULL pointer dereference in rb_insert_color — ref:_00D1igLOd._5005qNvgdm:ref</issue> <issue id="1209887" tracker="bnc">Regression: crash in __sk_destruct</issue> <issue id="1210124" tracker="bnc">SLES 15 SP3 NFS Server rsize bug upon update to kernel 5.3.18-150300.59.106.1</issue> <issue id="1210202" tracker="bnc">VUL-0: CVE-2023-1855: kernel: use-after-free bug in remove function xgene_hwmon_remove</issue> <issue id="1210301" tracker="bnc">VUL-0: kernel: cifs.ko out of bounds memory access in smb311_decode_neg_context()</issue> <issue id="1210329" tracker="bnc">VUL-0: CVE-2023-30772: kernel: use after free bug in da9150_charger_remove due to race condition</issue> <issue id="1210336" tracker="bnc">VUL-0: CVE-2023-1989: kernel: Use after free bug in btsdio_remove due to race condition</issue> <issue id="1210337" tracker="bnc">VUL-0: CVE-2023-1990: kernel: Use after free bug in ndlc_remove due to race condition</issue> <issue id="1210469" tracker="bnc">Obsolete KMP obsoletes</issue> <issue id="1210506" tracker="bnc">VUL-0: CVE-2023-1998: kernel: x86/speculation: Allow enabling STIBP with legacy IBRS</issue> <issue id="1210647" tracker="bnc">VUL-0: CVE-2023-2162: kernel-source-rt,kernel-source,kernel-source-azure: UAF during login when accessing the shost ipaddress</issue> <issue id="2017-5753" tracker="cve" /> <issue id="2020-36691" tracker="cve" /> <issue id="2021-3923" tracker="cve" /> <issue id="2021-4203" tracker="cve" /> <issue id="2022-20567" tracker="cve" /> <issue id="2022-43945" tracker="cve" /> <issue id="2023-0590" tracker="cve" /> <issue id="2023-0597" tracker="cve" /> <issue id="2023-1076" tracker="cve" /> <issue id="2023-1095" tracker="cve" /> <issue id="2023-1118" tracker="cve" /> <issue id="2023-1390" tracker="cve" /> <issue id="2023-1513" tracker="cve" /> <issue id="2023-1611" tracker="cve" /> <issue id="2023-1855" tracker="cve" /> <issue id="2023-1989" tracker="cve" /> <issue id="2023-1990" tracker="cve" /> <issue id="2023-1998" tracker="cve" /> <issue id="2023-2162" tracker="cve" /> <issue id="2023-23454" tracker="cve" /> <issue id="2023-23455" tracker="cve" /> <issue id="2023-28328" tracker="cve" /> <issue id="2023-28464" tracker="cve" /> <issue id="2023-28772" tracker="cve" /> <issue id="2023-30772" tracker="cve" /> <issue id="1209871" tracker="bnc">VUL-0: CVE-2023-1670: kernel-source-rt,kernel-source-azure,kernel-source: Use after free bug in xirc2ps_detach</issue> <issue id="1210498" tracker="bnc">VUL-0: CVE-2023-2124: kernel-source: OOB access in the XFS subsystem</issue> <issue id="1211037" tracker="bnc">VUL-0: CVE-2023-2483: kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove()</issue> <issue id="2023-2483" tracker="cve" /> <issue id="2023-2124" tracker="cve" /> <issue id="2023-1670" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>tabraham1</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2023-2483: Fixed a use after free bug in emac_remove due caused by a race condition (bsc#1211037). - CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498). - CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871). - CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547). - CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256). - CVE-2020-36691: Fixed a denial of service (unbounded recursion) vulnerability via a nested Netlink policy with a back reference (bsc#1209613 bsc#1209777). - CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778). - CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535). - CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850). - CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128). - CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795). - CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845). - CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599). - CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777). - CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837). - CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289). - CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532). - CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687). - CVE-2023-1855: Fixed an use-after-free flaw in xgene_hwmon_remove (bsc#1210202). - CVE-2023-1989: Fixed an use-after-free flaw in btsdio_remove (bsc#1210336). - CVE-2023-1990: Fixed an use-after-free flaw in ndlc_remove (bsc#1210337). - CVE-2023-1998: Fixed an use-after-free flaw during login when accessing the shost ipaddress (bsc#1210506). - CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647). - CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036). - CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125). - CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291). - CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052). - CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549). - CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329). The following non-security bugs were fixed: - Do not sign the vanilla kernel (bsc#1209008). - Fix kABI breakage (bsc#1208333) - PCI: hv: Add a per-bus mutex state_lock (bsc#1207185). - PCI: hv: Fix a race condition bug in hv_pci_query_relations() (bsc#1207185). - PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185). - PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185). - Remove obsolete KMP obsoletes (bsc#1210469). - Replace mkinitrd dependency with dracut (bsc#1202353). - cifs: fix double free in dfs mounts (bsc#1209845). - cifs: fix negotiate context parsing (bsc#1210301). - cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1209845). - cifs: missing null pointer check in cifs_mount (bsc#1209845). - cifs: serialize all mount attempts (bsc#1209845). - cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887). - ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168). - k-m-s: Drop Linux 2.6 support - kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor