File _patchinfo of Package patchinfo.37045
<patchinfo incident="37045"> <issue id="1215304" tracker="bnc">VUL-0: kernel: buffer overflow in s5p_cec_irq_handler</issue> <issue id="1220927" tracker="bnc">VUL-0: CVE-2023-52524: kernel: net: nfc: llcp: Add lock when modifying device list</issue> <issue id="1220937" tracker="bnc">VUL-0: CVE-2023-52563: kernel: drm/meson: fix memory leak on -&gt;hpd_notify callback</issue> <issue id="1230697" tracker="bnc">VUL-0: CVE-2024-8805: kernel: BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability</issue> <issue id="1234281" tracker="bnc">VUL-0: CVE-2024-53240: xen: XSA-465: Backend can crash Linux netfront</issue> <issue id="1234690" tracker="bnc">VUL-0: CVE-2024-53144: kernel: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE</issue> <issue id="1234846" tracker="bnc">VUL-0: CVE-2024-53156: kernel: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()</issue> <issue id="1234853" tracker="bnc">VUL-0: CVE-2024-53146: kernel: NFSD: prevent a potential integer overflow</issue> <issue id="1234891" tracker="bnc">VUL-0: CVE-2024-53173: kernel: NFSv4.0: Fix a use-after-free problem in the asynchronous open()</issue> <issue id="1234921" tracker="bnc">VUL-0: CVE-2024-53179: kernel: smb: client: fix use-after-free of signing key</issue> <issue id="1234963" tracker="bnc">VUL-0: CVE-2024-56539: kernel: wifi: mwifiex: fix memcpy() field-spanning write warning in mwifiex_config_scan()</issue> <issue id="1235004" tracker="bnc">VUL-0: CVE-2024-53214: kernel: vfio/pci: properly hide first-in-list PCIe extended capability</issue> <issue id="1235054" tracker="bnc">VUL-0: CVE-2024-53239: kernel: ALSA: 6fire: release resources at card release</issue> <issue id="1235056" tracker="bnc">VUL-0: CVE-2024-56604: kernel: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()</issue> <issue id="1235061" tracker="bnc">VUL-0: CVE-2024-56605: kernel: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()</issue> <issue id="1235073" tracker="bnc">VUL-0: CVE-2024-56548: kernel: hfsplus: don't query the device logical block size multiple times</issue> <issue id="1235480" tracker="bnc">VUL-0: CVE-2024-56631: kernel: scsi: sg: Fix slab-use-after-free read in sg_release()</issue> <issue id="1235584" tracker="bnc">VUL-0: CVE-2024-56704: kernel: 9p/xen: fix release of IRQ</issue> <issue id="2022-49035" tracker="cve" /> <issue id="2023-52524" tracker="cve" /> <issue id="2024-53144" tracker="cve" /> <issue id="2024-53146" tracker="cve" /> <issue id="2024-53156" tracker="cve" /> <issue id="2024-53173" tracker="cve" /> <issue id="2024-53179" tracker="cve" /> <issue id="2024-53214" tracker="cve" /> <issue id="2024-53239" tracker="cve" /> <issue id="2024-53240" tracker="cve" /> <issue id="2024-56539" tracker="cve" /> <issue id="2024-56548" tracker="cve" /> <issue id="2024-56604" tracker="cve" /> <issue id="2024-56605" tracker="cve" /> <issue id="2024-56631" tracker="cve" /> <issue id="2024-56704" tracker="cve" /> <issue id="2024-8805" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>jdelvare</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2022-49035: media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (bsc#1215304). - CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853). - CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846). - CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891). - CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). - CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). - CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054). - CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). - CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963). - CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073). - CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). - CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061). - CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480). - CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>