File _patchinfo of Package patchinfo.36021
<patchinfo incident="36021">
<issue id="1220145" tracker="bnc">VUL-0: CVE-2024-23307: kernel live patch: Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.</issue>
<issue id="1220832" tracker="bnc">VUL-0: CVE-2023-52502: kernel live patch: net: nfc: race conditions in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()</issue>
<issue id="1221302" tracker="bnc">VUL-0: CVE-2024-26610: kernel live patch: wifi: iwlwifi: fix a memory corruption</issue>
<issue id="1222685" tracker="bnc">VUL-0: CVE-2023-6546: kernel live patch: GSM multiplexing race condition leads to privilege escalation</issue>
<issue id="1222882" tracker="bnc">VUL-0: CVE-2024-26766: kernel live patch: IB/hfi1: sdma.h tx->num_descs off-by-one error</issue>
<issue id="1223059" tracker="bnc">VUL-0: CVE-2024-26852: kernel live patch: net/ipv6: UAF in ip6_route_mpath_notify()</issue>
<issue id="1223363" tracker="bnc">VUL-0: CVE-2024-26828: kernel live patch: cifs: underflow in parse_server_interfaces()</issue>
<issue id="1223514" tracker="bnc">VUL-0: CVE-2022-48651: kernel live patch: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header</issue>
<issue id="1223521" tracker="bnc">VUL-0: CVE-2022-48662: kernel live patch: drm/i915/gem: GPF in i915_perf_open_ioctl</issue>
<issue id="1223681" tracker="bnc">VUL-0: CVE-2024-26930: kernel live patch: scsi: qla2xxx: double free of the ha->vp_map pointer</issue>
<issue id="1223683" tracker="bnc">VUL-0: CVE-2024-26923: kernel live patch: af_unix: fix garbage collector racing against connect()</issue>
<issue id="1225013" tracker="bnc">VUL-0: CVE-2024-27398: kernel live patch: Bluetooth: fix use-after-free bugs caused by sco_sock_timeout</issue>
<issue id="1225099" tracker="bnc">VUL-0: CVE-2023-52846: kernel live patch: hsr: Prevent use after free in prp_create_tagged_frame()</issue>
<issue id="1225310" tracker="bnc">VUL-0: CVE-2024-35950: kernel live patch: drm/client: Fully protect modes[] with dev->mode_config.mutex</issue>
<issue id="1225312" tracker="bnc">VUL-0: CVE-2024-35861: kernel live patch: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()</issue>
<issue id="1225313" tracker="bnc">VUL-0: CVE-2024-35817: kernel live patch: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag</issue>
<issue id="1225739" tracker="bnc">VUL-0: CVE-2024-36899: kernel live patch: gpiolib: cdev: Fix use after free in lineinfo_changed_notify</issue>
<issue id="1226325" tracker="bnc">VUL-0: CVE-2024-36964: kernel live patch: fs/9p: only translate RWX permissions for plain 9P2000</issue>
<issue id="1228573" tracker="bnc">VUL-0: CVE-2024-41059: kernel live patch: hfsplus: fix uninit-value in copy_name</issue>
<issue id="1228786" tracker="bnc">VUL-0: CVE-2024-40954: kernel live patch: net: do not leave a dangling sk pointer, when socket creation fails</issue>
<issue id="2022-48651" tracker="cve" />
<issue id="2022-48662" tracker="cve" />
<issue id="2023-52502" tracker="cve" />
<issue id="2023-52846" tracker="cve" />
<issue id="2023-6546" tracker="cve" />
<issue id="2024-23307" tracker="cve" />
<issue id="2024-26610" tracker="cve" />
<issue id="2024-26766" tracker="cve" />
<issue id="2024-26828" tracker="cve" />
<issue id="2024-26852" tracker="cve" />
<issue id="2024-26923" tracker="cve" />
<issue id="2024-26930" tracker="cve" />
<issue id="2024-27398" tracker="cve" />
<issue id="2024-35817" tracker="cve" />
<issue id="2024-35861" tracker="cve" />
<issue id="2024-35950" tracker="cve" />
<issue id="2024-36899" tracker="cve" />
<issue id="2024-36964" tracker="cve" />
<issue id="2024-40954" tracker="cve" />
<issue id="2024-41059" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 5.14.21-150400_24_111 fixes several issues.
The following security issues were fixed:
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013).
- CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683).
- CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514).
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882).
- CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832).
- CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685).
</description>
<summary>Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)</summary>
</patchinfo>