Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:dirkmueller:acdc:sp5-rebuild
patchinfo.27692
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.27692
<patchinfo incident="27692"> <issue id="1203693" tracker="bnc">kernel-default failed to build for aarch64</issue> <issue id="1205149" tracker="bnc">%kernel_module_package_buildreqs needs to require suse-kernel-rpm-scriptlets</issue> <issue id="1206073" tracker="bnc">VUL-0: CVE-2022-3564: kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c</issue> <issue id="1206389" tracker="bnc">VUL-0: CVE-2022-3108: kernel: kmemdup's return value not checked</issue> <issue id="1206395" tracker="bnc">VUL-0: CVE-2022-3107: kernel: Unchecked kvmalloc_array return leads to null pointer dereference</issue> <issue id="1206664" tracker="bnc">VUL-0: CVE-2022-4662: kernel-source-azure,kernel-source-rt,kernel-source: Recursive locking violation in usb-storage that can cause the kernel to deadlock</issue> <issue id="1206677" tracker="bnc">VUL-0: kernel-source: sctp_diag: fix type confusion in inet_diag_msg_sctpasoc_fill()</issue> <issue id="1206784" tracker="bnc">VUL-0: kernel-source: HID: drop assumptions on non-empty lists</issue> <issue id="1207036" tracker="bnc">VUL-0: CVE-2023-23454: kernel: type-confusion in the CBQ network scheduler</issue> <issue id="1207186" tracker="bnc">VUL-0: kernel-source,kernel-source-rt,kernel-source-azure: HID: betop: check shape of output reports</issue> <issue id="1207237" tracker="bnc">VUL-0: CVE-2022-47929: kernel-source,kernel-source-rt,kernel-source-azure: NULL pointer dereference bug in the traffic control subsystem</issue> <issue id="2022-47929" tracker="cve" /> <issue id="2023-23454" tracker="cve" /> <issue id="2022-4662" tracker="cve" /> <issue id="2022-3564" tracker="cve" /> <issue id="2022-3108" tracker="cve" /> <issue id="2022-3107" tracker="cve" /> <issue id="PED-1706" tracker="jsc" /> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP1 kernel was updated receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-3107: Fixed missing check of return value of kvmalloc_array() (bnc#1206395). - CVE-2022-3108: Fixed missing check of return value of kmemdup() (bnc#1206389). - CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth component (bnc#1206073). - CVE-2022-4662: Fixed incorrect access control in the USB core subsystem that could lead a local user to crash the system (bnc#1206664). - CVE-2022-47929: Fixed NULL pointer dereference bug in the traffic control subsystem (bnc#1207237). - CVE-2023-23454: Fixed denial or service in cbq_classify in net/sched/sch_cbq.c (bnc#1207036). The following non-security bugs were fixed: - Added support for enabling livepatching related packages on -RT (jsc#PED-1706). - Added suse-kernel-rpm-scriptlets to kmp buildreqs (boo#1205149). - HID: betop: check shape of output reports (git-fixes, bsc#1207186). - HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes, bsc#1207186). - HID: check empty report_list in hid_validate_values() (git-fixes, bsc#1206784). - Reverted "constraints: increase disk space for all architectures" (bsc#1203693) - net: sched: atm: dont intepret cls results when asked to drop (bsc#1207036). - net: sched: cbq: dont intepret cls results when asked to drop (bsc#1207036). - sctp: fail if no bound addresses can be used for a given scope (bsc#1206677). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor