File _patchinfo of Package patchinfo.36196

<patchinfo incident="36196">
  <issue id="1210619" tracker="bnc">VUL-0: CVE-2023-1829: kernel live patch: Linux kernel: Vulnerabilities in the tcindex classifier</issue>
  <issue id="1223363" tracker="bnc">VUL-0: CVE-2024-26828: kernel live patch: cifs: underflow in parse_server_interfaces()</issue>
  <issue id="1223683" tracker="bnc">VUL-0: CVE-2024-26923: kernel live patch: af_unix: fix garbage collector racing against connect()</issue>
  <issue id="1225013" tracker="bnc">VUL-0: CVE-2024-27398: kernel live patch: Bluetooth: fix use-after-free bugs caused by sco_sock_timeout</issue>
  <issue id="1225202" tracker="bnc">VUL-0: CVE-2021-47378: kernel live patch: nvme-rdma: destroy cm id before destroy qp to avoid use after free</issue>
  <issue id="1225211" tracker="bnc">VUL-0: CVE-2021-47383: kernel live patch: tty: Fix out-of-bound vmalloc access in imageblit</issue>
  <issue id="1225302" tracker="bnc">VUL-0: CVE-2021-47402: kernel live patch: net: sched: flower: protect fl_walk() with rcu</issue>
  <issue id="1225309" tracker="bnc">VUL-0: CVE-2024-35864: kernel live patch: smb: client: fix potential UAF in smb2_is_valid_lease_break()</issue>
  <issue id="1225310" tracker="bnc">VUL-0: CVE-2024-35950: kernel live patch: drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex</issue>
  <issue id="1225311" tracker="bnc">VUL-0: CVE-2024-35862: kernel live patch: smb: client: fix potential UAF in smb2_is_network_name_deleted()</issue>
  <issue id="1225312" tracker="bnc">VUL-0: CVE-2024-35861: kernel live patch: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()</issue>
  <issue id="1225819" tracker="bnc">VUL-0: CVE-2023-52752: kernel live patch: smb: client: fix use-after-free bug in cifs_debug_data_proc_show()</issue>
  <issue id="1226325" tracker="bnc">VUL-0: CVE-2024-36964: kernel live patch: fs/9p: only translate RWX permissions for plain 9P2000</issue>
  <issue id="1227471" tracker="bnc">VUL-0: CVE-2021-47598: kernel live patch: sch_cake: do not call cake_destroy() from cake_init()</issue>
  <issue id="1227472" tracker="bnc">VUL-0: CVE-2021-47600: kernel live patch: dm btree remove: fix use after free in rebalance_children()</issue>
  <issue id="1227651" tracker="bnc">VUL-0: CVE-2021-47291: kernel live patch: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions</issue>
  <issue id="1228573" tracker="bnc">VUL-0: CVE-2024-41059: kernel live patch: hfsplus: fix uninit-value in copy_name</issue>
  <issue id="2021-47291" tracker="cve" />
  <issue id="2021-47378" tracker="cve" />
  <issue id="2021-47383" tracker="cve" />
  <issue id="2021-47402" tracker="cve" />
  <issue id="2021-47598" tracker="cve" />
  <issue id="2021-47600" tracker="cve" />
  <issue id="2023-1829" tracker="cve" />
  <issue id="2023-52752" tracker="cve" />
  <issue id="2024-26828" tracker="cve" />
  <issue id="2024-26923" tracker="cve" />
  <issue id="2024-27398" tracker="cve" />
  <issue id="2024-35861" tracker="cve" />
  <issue id="2024-35862" tracker="cve" />
  <issue id="2024-35864" tracker="cve" />
  <issue id="2024-35950" tracker="cve" />
  <issue id="2024-36964" tracker="cve" />
  <issue id="2024-41059" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 5.3.18-150200_24_191 fixes several issues.

The following security issues were fixed:

- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1227472).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312).
- CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325).
- CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013).
- CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310).
- CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619).
</description>
<summary>Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP2)</summary>
</patchinfo>
openSUSE Build Service is sponsored by