File _patchinfo of Package patchinfo.37201
<patchinfo incident="37201">
<issue id="1223683" tracker="bnc">VUL-0: CVE-2024-26923: kernel live patch: af_unix: fix garbage collector racing against connect()</issue>
<issue id="1225099" tracker="bnc">VUL-0: CVE-2023-52846: kernel live patch: hsr: Prevent use after free in prp_create_tagged_frame()</issue>
<issue id="1225429" tracker="bnc">VUL-0: CVE-2021-47517: kernel live patch: ethtool: do not perform operations on net devices being unregistered</issue>
<issue id="1225733" tracker="bnc">VUL-0: CVE-2024-36904: kernel live patch: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().</issue>
<issue id="1225739" tracker="bnc">VUL-0: CVE-2024-36899: kernel live patch: gpiolib: cdev: Fix use after free in lineinfo_changed_notify</issue>
<issue id="1225819" tracker="bnc">VUL-0: CVE-2023-52752: kernel live patch: smb: client: fix use-after-free bug in cifs_debug_data_proc_show()</issue>
<issue id="1226324" tracker="bnc">VUL-0: CVE-2024-36971: kernel live patch: fix __dst_negative_advice() race</issue>
<issue id="1227471" tracker="bnc">VUL-0: CVE-2021-47598: kernel live patch: sch_cake: do not call cake_destroy() from cake_init()</issue>
<issue id="1228349" tracker="bnc">VUL-0: CVE-2024-40909: kernel live patch: bpf: Fix a potential use-after-free in bpf_link_free()</issue>
<issue id="1228573" tracker="bnc">VUL-0: CVE-2024-41059: kernel live patch: hfsplus: fix uninit-value in copy_name</issue>
<issue id="1228786" tracker="bnc">VUL-0: CVE-2024-40954: kernel live patch: net: do not leave a dangling sk pointer, when socket creation fails</issue>
<issue id="1229273" tracker="bnc">VUL-0: CVE-2024-35949: kernel live patch: btrfs: make sure that WRITTEN is set on all metadata blocks</issue>
<issue id="1229275" tracker="bnc">VUL-0: CVE-2024-41057: kernel live patch: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()</issue>
<issue id="1229553" tracker="bnc">VUL-0: CVE-2024-43861: kernel live patch: net: usb: qmi_wwan: fix memory leak for not ip packets</issue>
<issue id="1232637" tracker="bnc">VUL-0: CVE-2022-48956: kernel live patch: ipv6: avoid use-after-free in ip6_fragment()</issue>
<issue id="1233712" tracker="bnc">VUL-0: CVE-2024-50264: kernel live patch: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans</issue>
<issue id="2021-47517" tracker="cve" />
<issue id="2021-47598" tracker="cve" />
<issue id="2022-48956" tracker="cve" />
<issue id="2023-52752" tracker="cve" />
<issue id="2023-52846" tracker="cve" />
<issue id="2024-26923" tracker="cve" />
<issue id="2024-35949" tracker="cve" />
<issue id="2024-36899" tracker="cve" />
<issue id="2024-36904" tracker="cve" />
<issue id="2024-36971" tracker="cve" />
<issue id="2024-40909" tracker="cve" />
<issue id="2024-40954" tracker="cve" />
<issue id="2024-41057" tracker="cve" />
<issue id="2024-41059" tracker="cve" />
<issue id="2024-43861" tracker="cve" />
<issue id="2024-50264" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 5.14.21-150500_55_68 fixes several issues.
The following security issues were fixed:
- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1229275).
- CVE-2024-36971: Fixed __dst_negative_advice() race (bsc#1226324).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233712).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1232637).
- CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471).
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683).
</description>
<summary>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)</summary>
</patchinfo>