File _patchinfo of Package patchinfo.34640

<patchinfo incident="34640">
  <issue id="1220145" tracker="bnc">VUL-0: CVE-2024-23307: kernel live patch: Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.</issue>
  <issue id="1223363" tracker="bnc">VUL-0: CVE-2024-26828: kernel live patch: cifs: underflow in parse_server_interfaces()</issue>
  <issue id="1223681" tracker="bnc">VUL-0: CVE-2024-26930: kernel live patch: scsi: qla2xxx: double free of the ha-&gt;vp_map pointer</issue>
  <issue id="1223683" tracker="bnc">VUL-0: CVE-2024-26923: kernel live patch: af_unix: fix garbage collector racing against connect()</issue>
  <issue id="2024-23307" tracker="cve" />
  <issue id="2024-26828" tracker="cve" />
  <issue id="2024-26923" tracker="cve" />
  <issue id="2024-26930" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 5.14.21-150400_24_92 fixes several issues.

The following security issues were fixed:

- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683).
- CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145).
</description>
<summary>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)</summary>
</patchinfo>
openSUSE Build Service is sponsored by