Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP4:Update
patchinfo.35900
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.35900
<patchinfo incident="35900"> <issue id="1216223" tracker="bnc">L3: ibmvfc max_xfer_size is missing ref:_00D1igLOd._5005qXBPNc:ref</issue> <issue id="1223600" tracker="bnc">L3: RT kernel - IRQ appears on isolated cores when it shouldn't appear based on the irqbalance and kernel args configuration</issue> <issue id="1223958" tracker="bnc">L3: /dev/disk/by-path not populated for certain RAID controllers [ref:_00D1igLOd._500Tr9pGs4:ref]</issue> <issue id="1225272" tracker="bnc">soft lockup on non-responding NFS server after blocking NFS port [ref:_00D1igLOd._500TrA9Uu1:ref]</issue> <issue id="1227487" tracker="bnc">powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()</issue> <issue id="1228466" tracker="bnc">VUL-0: CVE-2024-41087: kernel: ata: libata-core: Fix double free on error</issue> <issue id="1229407" tracker="bnc">VUL-0: CVE-2024-42301: kernel: dev/parport: fix the array out-of-bounds risk</issue> <issue id="1229633" tracker="bnc">VUL-0: CVE-2022-48911: kernel: netfilter: nf_queue: fix possible use-after-free</issue> <issue id="1229662" tracker="bnc">VUL-0: CVE-2022-48923: kernel: btrfs: prevent copying too big compressed lzo segment</issue> <issue id="1229947" tracker="bnc">VUL-0: CVE-2022-48944: kernel: sched: fix yet more sched_fork() races</issue> <issue id="1230015" tracker="bnc">VUL-0: CVE-2024-44946: kernel: kcm: Serialise kcm_sendmsg() for the same socket.</issue> <issue id="1230398" tracker="bnc">VUL-0: CVE-2022-48945: kernel: v4l: vivid: unpriviledged user can cause an unchecked pointer to the heap to be followed abusing V4L2_SEL_TGT_CROP</issue> <issue id="1230434" tracker="bnc">VUL-0: CVE-2024-45021: kernel: memcg_write_event_control(): fix a user-triggerable oops</issue> <issue id="1230507" tracker="bnc">VUL-0: CVE-2024-46674: kernel: usb: dwc3: st: fix probed platform device ref count on probe error path</issue> <issue id="1230767" tracker="bnc">VUL-0: CVE-2024-46774: kernel: powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()</issue> <issue id="1231016" tracker="bnc">L3: Intermittent nfs mount failures (may be due to SUNRPC over UDP)</issue> <issue id="2022-48945" tracker="cve" /> <issue id="2024-46774" tracker="cve" /> <issue id="2022-48944" tracker="cve" /> <issue id="2024-46674" tracker="cve" /> <issue id="2022-48911" tracker="cve" /> <issue id="2022-48923" tracker="cve" /> <issue id="2024-42301" tracker="cve" /> <issue id="2024-44946" tracker="cve" /> <issue id="2024-45021" tracker="cve" /> <issue id="2024-41087" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). - CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662) - CVE-2024-41087: Fix double free on error (bsc#1228466). - CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407). - CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). - CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). - CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe error path (bsc#1230507). The following non-security bugs were fixed: - blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). - blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). - kabi: add __nf_queue_get_refs() for kabi compliance. - scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). - scsi: smartpqi: Expose SAS address for SATA drives (bsc#1223958). - SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272 bsc#1231016). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor