File _patchinfo of Package patchinfo.34623

<patchinfo incident="34623">
  <issue id="1220145" tracker="bnc">VUL-0: CVE-2024-23307: kernel live patch: Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.</issue>
  <issue id="1223363" tracker="bnc">VUL-0: CVE-2024-26828: kernel live patch: cifs: underflow in parse_server_interfaces()</issue>
  <issue id="1223683" tracker="bnc">VUL-0: CVE-2024-26923: kernel live patch: af_unix: fix garbage collector racing against connect()</issue>
  <issue id="1225211" tracker="bnc">VUL-0: CVE-2021-47383: kernel live patch: tty: Fix out-of-bound vmalloc access in imageblit</issue>
  <issue id="2021-47383" tracker="cve" />
  <issue id="2024-23307" tracker="cve" />
  <issue id="2024-26828" tracker="cve" />
  <issue id="2024-26923" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 5.3.18-150300_59_124 fixes several issues.

The following security issues were fixed:

- CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145).
</description>
<summary>Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3)</summary>
</patchinfo>
openSUSE Build Service is sponsored by