Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP7:GA
patchinfo.33112
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.33112
<patchinfo incident="33112"> <issue id="1215887" tracker="bnc">VUL-0: CVE-2023-39191: kernel live patch: Linux Kernel eBPF Improper Input Validation Privilege Escalation Vulnerability</issue> <issue id="1216898" tracker="bnc">VUL-0: CVE-2023-46813: kernel live patch: SEV-ES local priv escalation</issue> <issue id="1218487" tracker="bnc">VUL-0: CVE-2023-6531: kernel live patch: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF</issue> <issue id="1218610" tracker="bnc">VUL-0: CVE-2023-51779: kernel live patch: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg</issue> <issue id="2023-39191" tracker="cve" /> <issue id="2023-46813" tracker="cve" /> <issue id="2023-51779" tracker="cve" /> <issue id="2023-6531" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.14.21-150500_55_28 fixes several issues. The following security issues were fixed: - CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487). - CVE-2023-46813: Fixed a local privilege escalation with user-space programs that have access to MMIO regions (bsc#1216898). - CVE-2023-39191: Fixed a lack of validation of dynamic pointers within user-supplied eBPF programs that may have allowed an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code. (bsc#1215863) - CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218610). </description> <summary>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor