Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP3:Update
patchinfo.33267
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.33267
<patchinfo incident="33267"> <issue id="1218613" tracker="bnc">VUL-0: CVE-2023-42753: kernel live patch: slab-out-of-bound access in the Linux kernel</issue> <issue id="1219078" tracker="bnc">VUL-0: CVE-2024-0565: kernel live patch: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability</issue> <issue id="1219296" tracker="bnc">VUL-0: CVE-2023-52340: kernel live patch: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU</issue> <issue id="2023-42753" tracker="cve" /> <issue id="2023-52340" tracker="cve" /> <issue id="2024-0565" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.3.18-150300_59_130 fixes several issues. The following security issues were fixed: - CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078). - CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1218613). - CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219296). </description> <summary>Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP3)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor