Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.30517
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.30517
<patchinfo incident="30517"> <issue id="1208839" tracker="bnc">VUL-0: CVE-2023-1077: kernel live patch: type confusion in pick_next_rt_entity</issue> <issue id="1210630" tracker="bnc">VUL-0: CVE-2023-2176: kernel live patch: Slab-out-of-bound read in compare_netdev_and_ip</issue> <issue id="1211187" tracker="bnc">VUL-0: CVE-2023-32233: kernel live patch: LPE due to use-after-free in Netfilter nf_tables</issue> <issue id="1211395" tracker="bnc">VUL-0: CVE-2023-2156: kernel live patch: Linux Kernel IPv6 RPL Protocol Reachable Assertion Denial-of-Service Vulnerability</issue> <issue id="1212849" tracker="bnc">VUL-0: CVE-2023-3090: kernel live patch: heap out-of-bounds vulnerability in the ipvlan network driver could lead to local privilege escalation</issue> <issue id="1213063" tracker="bnc">VUL-0: CVE-2023-35001: kernel live patch: nf_tables nft_byteorder_eval OOB read/write</issue> <issue id="1213244" tracker="bnc">VUL-0: CVE-2023-3567: kernel live patch: use after free in vcs_read() in the vc_screen driver due to race condition</issue> <issue id="2023-1077" tracker="cve" /> <issue id="2023-2156" tracker="cve" /> <issue id="2023-2176" tracker="cve" /> <issue id="2023-3090" tracker="cve" /> <issue id="2023-32233" tracker="cve" /> <issue id="2023-35001" tracker="cve" /> <issue id="2023-3567" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.14.21-150500_53 fixes several issues. The following security issues were fixed: - CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211187). - CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211395). - CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213244). - CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213063). - CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208839). - CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210630). - CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212849). </description> <summary>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor