Overview

Request 355040 accepted

- KEYS: Fix race between read and revoke (bnc#958951,
CVE-2015-7550).
- commit 60aea17

- patches.fixes/keys-fix-leak.patch: (bnc#962075, CVE-2016-0728).
- commit 5824983

- sctp: Prevent soft lockup when sctp_accept() is called during
a timeout event (CVE-2015-8767 bsc#961509).
- commit 9485403

- pptp: verify sockaddr_len in pptp_bind() and pptp_connect()
(bsc#959190, CVE-2015-8569).
- commit 32587c2

- bluetooth: Validate socket address length in sco_sock_bind()
(bsc#959399, CVE-2015-8575).
- commit 220d6d4

- Refresh
patches.fixes/net-add-validation-for-the-socket-syscall-protocol-a.patch.
Fix build error caused by missing U8_MAX.
- commit 862fda6

- net: add validation for the socket syscall protocol argument
(bsc#958886, CVE-2015-8543).
- commit 7563240

- KEYS: Make /proc/keys unconditional if CONFIG_KEYS=y
(boo#956934).

Request History
Jeff Mahoney's avatar

jeff_mahoney created request

- KEYS: Fix race between read and revoke (bnc#958951,
CVE-2015-7550).
- commit 60aea17

- patches.fixes/keys-fix-leak.patch: (bnc#962075, CVE-2016-0728).
- commit 5824983

- sctp: Prevent soft lockup when sctp_accept() is called during
a timeout event (CVE-2015-8767 bsc#961509).
- commit 9485403

- pptp: verify sockaddr_len in pptp_bind() and pptp_connect()
(bsc#959190, CVE-2015-8569).
- commit 32587c2

- bluetooth: Validate socket address length in sco_sock_bind()
(bsc#959399, CVE-2015-8575).
- commit 220d6d4

- Refresh
patches.fixes/net-add-validation-for-the-socket-syscall-protocol-a.patch.
Fix build error caused by missing U8_MAX.
- commit 862fda6

- net: add validation for the socket syscall protocol argument
(bsc#958886, CVE-2015-8543).
- commit 7563240

- KEYS: Make /proc/keys unconditional if CONFIG_KEYS=y
(boo#956934).


Wolfgang Rosenauer's avatar

wrosenauer accepted request

thanks

openSUSE Build Service is sponsored by