Описание
Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)
This update for the Linux Kernel 5.3.18-150300_59_182 fixes several issues.
The following security issues were fixed:
- CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788).
- CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218).
Список пакетов
SUSE Linux Enterprise Live Patching 12 SP5
SUSE Linux Enterprise Live Patching 15 SP3
Ссылки
- Link for SUSE-SU-2025:1275-1
- E-Mail link for SUSE-SU-2025:1275-1
- SUSE Security Ratings
- SUSE Bug 1235218
- SUSE Bug 1238788
- SUSE Bug 1238790
- SUSE CVE CVE-2022-49563 page
- SUSE CVE CVE-2022-49564 page
- SUSE CVE CVE-2024-56600 page
Описание
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Затронутые продукты
Ссылки
- CVE-2022-49563
- SUSE Bug 1238787
- SUSE Bug 1238788
Описание
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Затронутые продукты
Ссылки
- CVE-2022-49564
- SUSE Bug 1238789
- SUSE Bug 1238790
Описание
In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.
Затронутые продукты
Ссылки
- CVE-2024-56600
- SUSE Bug 1235217
- SUSE Bug 1235218