File _patchinfo of Package patchinfo.35371
<patchinfo incident="35371">
<issue id="1210619" tracker="bnc">VUL-0: CVE-2023-1829: kernel live patch: Linux kernel: Vulnerabilities in the tcindex classifier</issue>
<issue id="1218487" tracker="bnc">VUL-0: CVE-2023-6531: kernel live patch: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF</issue>
<issue id="1220145" tracker="bnc">VUL-0: CVE-2024-23307: kernel live patch: Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.</issue>
<issue id="1220537" tracker="bnc">VUL-0: CVE-2021-46955: kernel live patch: openvswitch: fix stack OOB read while fragmenting IPv4 packets</issue>
<issue id="1221302" tracker="bnc">VUL-0: CVE-2024-26610: kernel live patch: wifi: iwlwifi: fix a memory corruption</issue>
<issue id="1222685" tracker="bnc">VUL-0: CVE-2023-6546: kernel live patch: GSM multiplexing race condition leads to privilege escalation</issue>
<issue id="1223059" tracker="bnc">VUL-0: CVE-2024-26852: kernel live patch: net/ipv6: UAF in ip6_route_mpath_notify()</issue>
<issue id="1223363" tracker="bnc">VUL-0: CVE-2024-26828: kernel live patch: cifs: underflow in parse_server_interfaces()</issue>
<issue id="1223514" tracker="bnc">VUL-0: CVE-2022-48651: kernel live patch: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header</issue>
<issue id="1223683" tracker="bnc">VUL-0: CVE-2024-26923: kernel live patch: af_unix: fix garbage collector racing against connect()</issue>
<issue id="1225013" tracker="bnc">VUL-0: CVE-2024-27398: kernel live patch: Bluetooth: fix use-after-free bugs caused by sco_sock_timeout</issue>
<issue id="1225202" tracker="bnc">VUL-0: CVE-2021-47378: kernel live patch: nvme-rdma: destroy cm id before destroy qp to avoid use after free</issue>
<issue id="1225211" tracker="bnc">VUL-0: CVE-2021-47383: kernel live patch: tty: Fix out-of-bound vmalloc access in imageblit</issue>
<issue id="1225302" tracker="bnc">VUL-0: CVE-2021-47402: kernel live patch: net: sched: flower: protect fl_walk() with rcu</issue>
<issue id="1225310" tracker="bnc">VUL-0: CVE-2024-35950: kernel live patch: drm/client: Fully protect modes[] with dev->mode_config.mutex</issue>
<issue id="2021-46955" tracker="cve" />
<issue id="2021-47378" tracker="cve" />
<issue id="2021-47383" tracker="cve" />
<issue id="2021-47402" tracker="cve" />
<issue id="2022-48651" tracker="cve" />
<issue id="2023-1829" tracker="cve" />
<issue id="2023-6531" tracker="cve" />
<issue id="2023-6546" tracker="cve" />
<issue id="2024-23307" tracker="cve" />
<issue id="2024-26610" tracker="cve" />
<issue id="2024-26828" tracker="cve" />
<issue id="2024-26852" tracker="cve" />
<issue id="2024-26923" tracker="cve" />
<issue id="2024-27398" tracker="cve" />
<issue id="2024-35950" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 5.3.18-150300_59_153 fixes several issues.
The following security issues were fixed:
- CVE-2021-47402: Fixed use-after-free in fl_walk() (bsc#1225301)
- CVE-2021-47378: Fixed use-after-free by destroying cm id before destroying qp (bsc#1225202).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013).
- CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310).
- CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514).
- CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619).
</description>
<summary>Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)</summary>
</patchinfo>