Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:dirkmueller:acdc:as_python3_module
patchinfo.34562
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.34562
<patchinfo incident="34562"> <issue id="1156395" tracker="bnc">[TRACKERBUG] 5.3 powerpc base kernel fixes</issue> <issue id="1171988" tracker="bnc">VUL-0: CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjac</issue> <issue id="1176447" tracker="bnc">TRACKERBUG Network Infrastructure backports for 15SP3</issue> <issue id="1176774" tracker="bnc">Mellanox mlxsw/platform driver update for SLE15-SP3</issue> <issue id="1181147" tracker="bnc">patch list required for mellanox (19.01.2021)</issue> <issue id="1191958" tracker="bnc">VUL-0: CVE-2021-43389: kernel-source,kernel-source-azure,kernel-source-rt: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c</issue> <issue id="1195065" tracker="bnc">VUL-0: CVE-2022-22942: kernel-source: Vulnerability in the vmwgfx driver</issue> <issue id="1195254" tracker="bnc">VUL-0: CVE-2022-0435: kernel-source: tipc: Remote Stack Overflow in Linux Kernel</issue> <issue id="1195798" tracker="bnc">ceph: properly put ceph_string reference after async create attempt</issue> <issue id="1202623" tracker="bnc">VUL-0: CVE-2022-2938: kernel: use-after-free when psi trigger is destroyed while being polled.</issue> <issue id="1218148" tracker="bnc">VUL-0: CVE-2023-24023: BLUFFS: kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses</issue> <issue id="1219224" tracker="bnc">OCFS2 writes delay on large volumes - slow la window lookup from global_bitmap</issue> <issue id="1219633" tracker="bnc">L3-Question: kernel workqueue and soft lockups for extended periods with NFS involved in backtraces</issue> <issue id="1222015" tracker="bnc">L3: TSC clocksource spuriously declared invalid in 12+ socket Sapphire Rapids systems</issue> <issue id="1223011" tracker="bnc">VUL-0: CVE-2024-26822: kernel: smb: client: set correct id, uid and cruid for multiuser automounts</issue> <issue id="1223384" tracker="bnc">VUL-0: CVE-2024-26923: kernel: af_unix: fix garbage collector racing against connect()</issue> <issue id="1224671" tracker="bnc">VUL-0: CVE-2024-35878: kernel: of: module: prevent NULL pointer dereference in vsnprintf()</issue> <issue id="1224703" tracker="bnc">VUL-0: CVE-2024-35950: kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex</issue> <issue id="1224749" tracker="bnc">VUL-0: CVE-2024-35789: kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes</issue> <issue id="1224764" tracker="bnc">VUL-0: CVE-2024-35862: kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted()</issue> <issue id="1224765" tracker="bnc">VUL-0: CVE-2024-35864: kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break()</issue> <issue id="1224766" tracker="bnc">VUL-0: CVE-2024-35861: kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()</issue> <issue id="1224865" tracker="bnc">VUL-0: CVE-2021-47247: kernel: net/mlx5e: Fix use-after-free of encap entry in neigh update handler</issue> <issue id="1225010" tracker="bnc">VUL-0: CVE-2021-47311: kernel: net: qcom/emac: fix UAF in emac_remove</issue> <issue id="1225047" tracker="bnc">VUL-0: CVE-2021-47328: kernel: scsi: iscsi: Fix conn use after free during resets</issue> <issue id="1225109" tracker="bnc">VUL-0: CVE-2023-52707: kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue()</issue> <issue id="1225161" tracker="bnc">VUL-0: CVE-2021-47368: kernel: enetc: fix illegal access when reading affinity_hint</issue> <issue id="1225184" tracker="bnc">VUL-0: CVE-2021-47372: kernel: net: macb: fix use after free on rmmod</issue> <issue id="1225203" tracker="bnc">VUL-0: CVE-2021-47379: kernel: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd</issue> <issue id="1225487" tracker="bnc">VUL-0: CVE-2023-52752: kernel: smb: client: fix use-after-free bug in cifs_debug_data_proc_show()</issue> <issue id="1225518" tracker="bnc">VUL-0: CVE-2021-47571: kernel: staging: rtl8192e: fix use after free in _rtl92e_pci_disconnect()</issue> <issue id="1225611" tracker="bnc">VUL-0: CVE-2023-52881: kernel: tcp: do not accept ACK of bytes we never sent</issue> <issue id="1225732" tracker="bnc">VUL-0: CVE-2024-36904: kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().</issue> <issue id="1225749" tracker="bnc">VUL-0: CVE-2024-36894: kernel: usb: gadget: f_fs: fix race between aio_cancel() and AIO request complete</issue> <issue id="1225840" tracker="bnc">VUL-0: CVE-2024-36940: kernel: pinctrl: core: delete incorrect free in pinctrl_enable()</issue> <issue id="1225866" tracker="bnc">VUL-0: CVE-2024-36964: kernel: fs/9p: only translate RWX permissions for plain 9P2000</issue> <issue id="1226226" tracker="bnc">L3: Backport request for commit b6a1f9a, "avoid infinite loop in pnfs_update_layout" — ref:_00D1igLOd._500TrBmceA:ref</issue> <issue id="1226537" tracker="bnc">VUL-0: CVE-2021-47576: kernel: scsi: scsi_debug: sanity check block descriptor length in resp_mode_select()</issue> <issue id="1226552" tracker="bnc">VUL-0: CVE-2021-47595: kernel: net/sched: sch_ets: don't remove idle classes from the round-robin list</issue> <issue id="1226554" tracker="bnc">VUL-0: CVE-2021-47602: kernel: mac80211: track only QoS data frames for admission control</issue> <issue id="1226557" tracker="bnc">VUL-0: CVE-2021-47589: kernel: igbvf: fix double free in `igbvf_probe`</issue> <issue id="1226558" tracker="bnc">VUL-0: CVE-2021-47596: kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg</issue> <issue id="1226562" tracker="bnc">VUL-0: CVE-2021-47609: kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver</issue> <issue id="1226563" tracker="bnc">VUL-0: CVE-2021-47583: kernel: media: mxl111sf: change mutex_init() location</issue> <issue id="1226575" tracker="bnc">VUL-0: CVE-2021-47600: kernel: dm btree remove: fix use after free in rebalance_children()</issue> <issue id="1226583" tracker="bnc">VUL-0: CVE-2021-47611: kernel: mac80211: validate extended element ID is present</issue> <issue id="1226585" tracker="bnc">VUL-0: CVE-2021-47612: kernel: nfc: fix segfault in nfc_genl_dump_devices_done</issue> <issue id="1226587" tracker="bnc">VUL-0: CVE-2024-38541: kernel: of: module: add buffer overflow check in of_modalias()</issue> <issue id="1226595" tracker="bnc">VUL-0: CVE-2024-38545: kernel: RDMA/hns: Fix UAF for cq async event</issue> <issue id="1226614" tracker="bnc">VUL-0: CVE-2021-47617: kernel: PCI: pciehp: Fix infinite loop in IRQ handler upon power fault</issue> <issue id="1226619" tracker="bnc">VUL-0: CVE-2022-48722: kernel: net: ieee802154: ca8210: Stop leaking skb's</issue> <issue id="1226621" tracker="bnc">VUL-0: CVE-2022-48715: kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe</issue> <issue id="1226624" tracker="bnc">VUL-0: CVE-2022-48724: kernel: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()</issue> <issue id="1226643" tracker="bnc">VUL-0: CVE-2022-48747: kernel: block: fix wrong offset in bio_truncate()</issue> <issue id="1226644" tracker="bnc">VUL-0: CVE-2021-47618: kernel: ARM: 9170/1: fix panic when kasan and kprobe are enabled</issue> <issue id="1226645" tracker="bnc">VUL-0: CVE-2021-47619: kernel: i40e: Fix queues reservation for XDP</issue> <issue id="1226647" tracker="bnc">VUL-0: CVE-2022-48748: kernel: net: bridge: vlan: fix memory leak in __allowed_ingress</issue> <issue id="1226650" tracker="bnc">VUL-0: CVE-2022-48749: kernel: drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc</issue> <issue id="1226669" tracker="bnc">VUL-0: CVE-2021-47620: kernel: Bluetooth: refactor malicious adv data check</issue> <issue id="1226670" tracker="bnc">VUL-0: CVE-2021-4439: kernel: isdn: cpai: check ctr->cnr to avoid array index out of bound</issue> <issue id="1226672" tracker="bnc">VUL-0: CVE-2022-48711: kernel: tipc: improve size validations for received domain records</issue> <issue id="1226674" tracker="bnc">VUL-0: CVE-2022-48738: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()</issue> <issue id="1226679" tracker="bnc">VUL-0: CVE-2022-48717: kernel: ASoC: max9759: fix underflow in speaker_gain_control_put()</issue> <issue id="1226686" tracker="bnc">VUL-0: CVE-2022-48726: kernel: RDMA/ucma: Protect mc during concurrent multicast leaves</issue> <issue id="1226691" tracker="bnc">VUL-0: CVE-2022-48728: kernel: IB/hfi1: Fix AIP early init panic</issue> <issue id="1226692" tracker="bnc">VUL-0: CVE-2022-48754: kernel: phylib: fix potential use-after-free</issue> <issue id="1226698" tracker="bnc">VUL-0: CVE-2022-48756: kernel: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable</issue> <issue id="1226703" tracker="bnc">VUL-0: CVE-2022-48746: kernel: net/mlx5e: Fix handling of wrong devices during bond netevent</issue> <issue id="1226708" tracker="bnc">VUL-0: CVE-2022-48758: kernel: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()</issue> <issue id="1226709" tracker="bnc">VUL-0: CVE-2022-48752: kernel: powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending</issue> <issue id="1226711" tracker="bnc">VUL-0: CVE-2022-48759: kernel: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev</issue> <issue id="1226712" tracker="bnc">VUL-0: CVE-2022-48760: kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers</issue> <issue id="1226713" tracker="bnc">VUL-0: CVE-2022-48730: kernel: dma-buf: heaps: Fix potential spectre v1 gadget</issue> <issue id="1226715" tracker="bnc">VUL-0: CVE-2022-48767: kernel: ceph: properly put ceph_string reference after async create attempt</issue> <issue id="1226716" tracker="bnc">VUL-0: CVE-2022-48732: kernel: drm/nouveau: fix off by one in BIOS boundary checking</issue> <issue id="1226720" tracker="bnc">VUL-0: CVE-2022-48768: kernel: tracing/histogram: Fix a potential memory leak for kstrdup()</issue> <issue id="1226721" tracker="bnc">VUL-0: CVE-2022-48736: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()</issue> <issue id="1226732" tracker="bnc">VUL-0: CVE-2022-48771: kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy</issue> <issue id="1226758" tracker="bnc">VUL-0: CVE-2024-38610: kernel: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map()</issue> <issue id="1226762" tracker="bnc">VUL-0: CVE-2022-48737: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()</issue> <issue id="1226786" tracker="bnc">VUL-0: CVE-2024-38560: kernel: scsi: bfa: ensure the copied buf is NUL terminated</issue> <issue id="1226962" tracker="bnc">TSC clocksource spuriously declared invalid in 12+ socket Sapphire Rapids systems</issue> <issue id="2021-3896" tracker="cve" /> <issue id="2021-43389" tracker="cve" /> <issue id="2021-4439" tracker="cve" /> <issue id="2021-47247" tracker="cve" /> <issue id="2021-47311" tracker="cve" /> <issue id="2021-47328" tracker="cve" /> <issue id="2021-47368" tracker="cve" /> <issue id="2021-47372" tracker="cve" /> <issue id="2021-47379" tracker="cve" /> <issue id="2021-47571" tracker="cve" /> <issue id="2021-47576" tracker="cve" /> <issue id="2021-47583" tracker="cve" /> <issue id="2021-47589" tracker="cve" /> <issue id="2021-47595" tracker="cve" /> <issue id="2021-47596" tracker="cve" /> <issue id="2021-47600" tracker="cve" /> <issue id="2021-47602" tracker="cve" /> <issue id="2021-47609" tracker="cve" /> <issue id="2021-47611" tracker="cve" /> <issue id="2021-47612" tracker="cve" /> <issue id="2021-47617" tracker="cve" /> <issue id="2021-47618" tracker="cve" /> <issue id="2021-47619" tracker="cve" /> <issue id="2021-47620" tracker="cve" /> <issue id="2022-0435" tracker="cve" /> <issue id="2022-22942" tracker="cve" /> <issue id="2022-2938" tracker="cve" /> <issue id="2022-48711" tracker="cve" /> <issue id="2022-48715" tracker="cve" /> <issue id="2022-48717" tracker="cve" /> <issue id="2022-48722" tracker="cve" /> <issue id="2022-48724" tracker="cve" /> <issue id="2022-48726" tracker="cve" /> <issue id="2022-48728" tracker="cve" /> <issue id="2022-48730" tracker="cve" /> <issue id="2022-48732" tracker="cve" /> <issue id="2022-48736" tracker="cve" /> <issue id="2022-48737" tracker="cve" /> <issue id="2022-48738" tracker="cve" /> <issue id="2022-48746" tracker="cve" /> <issue id="2022-48747" tracker="cve" /> <issue id="2022-48748" tracker="cve" /> <issue id="2022-48749" tracker="cve" /> <issue id="2022-48752" tracker="cve" /> <issue id="2022-48754" tracker="cve" /> <issue id="2022-48756" tracker="cve" /> <issue id="2022-48758" tracker="cve" /> <issue id="2022-48759" tracker="cve" /> <issue id="2022-48760" tracker="cve" /> <issue id="2022-48767" tracker="cve" /> <issue id="2022-48768" tracker="cve" /> <issue id="2022-48771" tracker="cve" /> <issue id="2023-24023" tracker="cve" /> <issue id="2023-52707" tracker="cve" /> <issue id="2023-52752" tracker="cve" /> <issue id="2023-52881" tracker="cve" /> <issue id="2024-26822" tracker="cve" /> <issue id="2024-26923" tracker="cve" /> <issue id="2024-35789" tracker="cve" /> <issue id="2024-35861" tracker="cve" /> <issue id="2024-35862" tracker="cve" /> <issue id="2024-35864" tracker="cve" /> <issue id="2024-35878" tracker="cve" /> <issue id="2024-35950" tracker="cve" /> <issue id="2024-36894" tracker="cve" /> <issue id="2024-36904" tracker="cve" /> <issue id="2024-36940" tracker="cve" /> <issue id="2024-36964" tracker="cve" /> <issue id="2024-38541" tracker="cve" /> <issue id="2024-38545" tracker="cve" /> <issue id="2024-38559" tracker="cve" /> <issue id="2024-38560" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2021-47247: net/mlx5e: Fix use-after-free of encap entry in neigh update handler (bsc#1224865). - CVE-2021-47311: net: qcom/emac: fix UAF in emac_remove (bsc#1225010). - CVE-2021-47368: enetc: Fix illegal access when reading affinity_hint (bsc#1225161). - CVE-2021-47372: net: macb: fix use after free on rmmod (bsc#1225184). - CVE-2021-47379: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd (bsc#1225203). - CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518). - CVE-2022-48760: USB: core: Fix hang in usb_kill_urb by adding memory barriers (bsc#1226712). - CVE-2023-52707: sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1225109). polled (bsc#1202623). - CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). - CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611). - CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). - CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749). - CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). - CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). - CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). - CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1224703). - CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749). - CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732). - CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840). - CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866). - CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595) - CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226758). - CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786). The following non-security bugs were fixed: - NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226). - ocfs2: adjust enabling place for la window (bsc#1219224). - ocfs2: fix sparse warnings (bsc#1219224). - ocfs2: improve write IO performance when fragmentation is high (bsc#1219224). - ocfs2: speed up chain-list searching (bsc#1219224). - psi: Fix uaf issue when psi trigger is destroyed while being - x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor