Download
| Alert*
oval:org.secpod.oval:def:1601656
In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure during the renaming of a device oval:org.secpod.oval:def:1701231 In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure during the renaming of a device oval:org.secpod.oval:def:3301714 Security update for the Linux Kernel oval:org.secpod.oval:def:3301726 Security update for the Linux Kernel oval:org.secpod.oval:def:1507183 [4.1.12-124.81.2.el7uek] - rebuild bumping release [4.1.12-124.81.1.el7uek] - netfilter: xt_sctp: validate the flag_info count [Orabug: 35923500] {CVE-2023-39193} - USB: ene_usb6250: Allocate enough memory for full object [Orabug: 35924058] {CVE-2023-45862} - netfilter: xt_u32: validate user space ... oval:org.secpod.oval:def:1507425 [4.1.12-124.81.2] - rebuild bumping release [4.1.12-124.81.1] - netfilter: xt_sctp: validate the flag_info count [Orabug: 35923500] {CVE-2023-39193} - USB: ene_usb6250: Allocate enough memory for full object [Orabug: 35924058] {CVE-2023-45862} - netfilter: xt_u32: validate user space input [Orabu ... oval:org.secpod.oval:def:3302335 Security update for the Linux Kernel oval:org.secpod.oval:def:3301407 Security update for the Linux Kernel oval:org.secpod.oval:def:3301715 Security update for the Linux Kernel oval:org.secpod.oval:def:89051063 The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2023-31085: Fixed a divide-by-zero error in do_div that could cause a local DoS. * CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an obj ... oval:org.secpod.oval:def:3301950 Security update for the Linux Kernel oval:org.secpod.oval:def:1701238 A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM advertising eIBRS support to L1. An attacker at L2 with code execution ... oval:org.secpod.oval:def:1701228 A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM advertising eIBRS support to L1. An attacker at L2 with code execution ... |