Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP5:Update
patchinfo.33293
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.33293
<patchinfo incident="33293"> <issue id="1219078" tracker="bnc">VUL-0: CVE-2024-0565: kernel live patch: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability</issue> <issue id="1219296" tracker="bnc">VUL-0: CVE-2023-52340: kernel live patch: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU</issue> <issue id="1219432" tracker="bnc">VUL-0: CVE-2024-1085: kernel live patch: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function</issue> <issue id="2023-52340" tracker="cve" /> <issue id="2024-0565" tracker="cve" /> <issue id="2024-1085" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.14.21-150500_13_30 fixes several issues. The following security issues were fixed: - CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078). - CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219432). - CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219296). </description> <summary>Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor