File _patchinfo of Package patchinfo.33791
<patchinfo incident="33791">
<issue id="1190576" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.0.0.2 with bug fixes and Prism+ ASIC support</issue>
<issue id="1192145" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.0.0.3</issue>
<issue id="1204614" tracker="bnc">VUL-0: CVE-2022-42432: kernel-source-rt,kernel-source-azure,kernel-source: nftables: leak of stale stack data to userspace via nf_osf_find()</issue>
<issue id="1211592" tracker="bnc">VUL-0: CVE-2023-2860: kernel-source-azure,kernel-source,kernel-source-rt: Linux Kernel IPv6 Segment Routing Out-Of-Bounds Read Information Disclosure Vulnerability</issue>
<issue id="1218562" tracker="bnc">VUL-0: CVE-2023-6270: kernel: use-after-free vulnerability in ATA over Ethernet (AoE) driver</issue>
<issue id="1218917" tracker="bnc">VUL-0: CVE-2024-0639: kernel: potential deadlock on &net->sctp.addr_wq_lock leading to DOS</issue>
<issue id="1219169" tracker="bnc">VUL-0: CVE-2024-23307: kernel-source,kernel-source-azure,kernel-source-rt: Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.</issue>
<issue id="1219170" tracker="bnc">VUL-0: CVE-2024-22099: kernel: NULL pointer dereference vulnerability allows buffers overflow in /net/bluetooth/rfcomm/core.c</issue>
<issue id="1219264" tracker="bnc">VUL-0: DISPUTED: CVE-2024-0841: kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function</issue>
<issue id="1220513" tracker="bnc">VUL-0: CVE-2021-46955: kernel-source,kernel-source-azure,kernel-source-rt: openvswitch: fix stack OOB read while fragmenting IPv4 packets</issue>
<issue id="1220755" tracker="bnc">VUL-0: CVE-2021-47041: kernel: nvmet-tcp: fix incorrect locking in state_change sk callback</issue>
<issue id="1220854" tracker="bnc">VUL-0: CVE-2021-47074: kernel: nvme-loop: fix memory leak in nvme_loop_create_ctrl()</issue>
<issue id="1221543" tracker="bnc">VUL-0: CVE-2021-47113: kernel: btrfs: abort in rename_exchange if we fail to insert the second ref</issue>
<issue id="1221545" tracker="bnc">VUL-0: CVE-2021-47131: kernel: net/tls: use-after-free after the TLS device goes down and up</issue>
<issue id="1222449" tracker="bnc">VUL-0: CVE-2024-26744: kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter</issue>
<issue id="1222482" tracker="bnc">VUL-0: CVE-2024-26688: kernel: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super</issue>
<issue id="1222503" tracker="bnc">VUL-0: CVE-2024-26689: kernel: ceph: prevent use-after-free in encode_cap_msg()</issue>
<issue id="1222559" tracker="bnc">VUL-0: CVE-2024-26739: kernel: net/sched: act_mirred: don't override retval if we already lost the skb</issue>
<issue id="1222585" tracker="bnc">VUL-0: CVE-2024-26733: kernel: arp: Prevent overflow in arp_req_get().</issue>
<issue id="1222624" tracker="bnc">VUL-0: CVE-2024-26816: kernel: startup_xen address leaked in user readable /sys/kernel/notes</issue>
<issue id="1222666" tracker="bnc">VUL-0: CVE-2021-47184: kernel: i40e: Fix NULL ptr dereference on VSI filter sync</issue>
<issue id="1222669" tracker="bnc">VUL-0: CVE-2021-47185: kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc</issue>
<issue id="1222709" tracker="bnc">VUL-0: CVE-2021-47212: kernel: net/mlx5: Update error handler for UCTX and UMEM</issue>
<issue id="1222790" tracker="bnc">VUL-0: CVE-2021-47207: kernel: ALSA: gus: null pointer dereference on pointer block</issue>
<issue id="1222792" tracker="bnc">VUL-0: CVE-2021-47201: kernel: iavf: panic encountered when the interface is disabled</issue>
<issue id="1222829" tracker="bnc">VUL-0: CVE-2021-47194: kernel: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type</issue>
<issue id="1222881" tracker="bnc">VUL-0: CVE-2021-47203: kernel: scsi: lpfc: list_add() corruption in lpfc_drain_txq()</issue>
<issue id="1222883" tracker="bnc">VUL-0: CVE-2021-47198: kernel: scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine</issue>
<issue id="1222894" tracker="bnc">VUL-0: CVE-2021-47206: kernel: usb: host: ohci-tmio: check return value after calling platform_get_resource()</issue>
<issue id="1222976" tracker="bnc">VUL-0: CVE-2024-26840: kernel: cachefiles: memory leak in cachefiles_add_cache()</issue>
<issue id="1223016" tracker="bnc">VUL-0: CVE-2024-26898: kernel: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts</issue>
<issue id="1223057" tracker="bnc">VUL-0: CVE-2024-26852: kernel: net/ipv6: UAF in ip6_route_mpath_notify()</issue>
<issue id="1223111" tracker="bnc">VUL-0: CVE-2024-26862: kernel: packet: data-races in ignore_outgoing</issue>
<issue id="1223187" tracker="bnc">VUL-0: CVE-2024-26903: kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security</issue>
<issue id="1223202" tracker="bnc">VUL-0: CVE-2024-26906: kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()</issue>
<issue id="1223475" tracker="bnc">VUL-0: CVE-2022-48631: kernel: ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0</issue>
<issue id="1223482" tracker="bnc">VUL-0: CVE-2022-48654: kernel: netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()</issue>
<issue id="1223513" tracker="bnc">VUL-0: CVE-2022-48651: kernel: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header</issue>
<issue id="1223824" tracker="bnc">VUL-0: CVE-2024-27043: kernel: media: media: dvbdev: use-after-free in different places</issue>
<issue id="1223952" tracker="bnc">VUL-0: CVE-2022-48687: kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data.</issue>
<issue id="2024-26840" tracker="cve" />
<issue id="2021-47113" tracker="cve" />
<issue id="2024-26739" tracker="cve" />
<issue id="2021-47131" tracker="cve" />
<issue id="2023-2860" tracker="cve" />
<issue id="2022-48687" tracker="cve" />
<issue id="2024-26852" tracker="cve" />
<issue id="2021-46955" tracker="cve" />
<issue id="2024-26862" tracker="cve" />
<issue id="2024-0639" tracker="cve" />
<issue id="2024-27043" tracker="cve" />
<issue id="2022-48631" tracker="cve" />
<issue id="2024-23307" tracker="cve" />
<issue id="2022-48654" tracker="cve" />
<issue id="2022-48651" tracker="cve" />
<issue id="2024-26906" tracker="cve" />
<issue id="2024-26816" tracker="cve" />
<issue id="2024-0841" tracker="cve" />
<issue id="2024-26688" tracker="cve" />
<issue id="2024-22099" tracker="cve" />
<issue id="2024-26903" tracker="cve" />
<issue id="2024-26733" tracker="cve" />
<issue id="2021-47207" tracker="cve" />
<issue id="2021-47194" tracker="cve" />
<issue id="2021-47184" tracker="cve" />
<issue id="2021-47201" tracker="cve" />
<issue id="2021-47212" tracker="cve" />
<issue id="2021-47203" tracker="cve" />
<issue id="2021-47198" tracker="cve" />
<issue id="2021-47185" tracker="cve" />
<issue id="2021-47206" tracker="cve" />
<issue id="2023-6270" tracker="cve" />
<issue id="2024-26898" tracker="cve" />
<issue id="2024-26689" tracker="cve" />
<issue id="2021-47041" tracker="cve" />
<issue id="2021-47074" tracker="cve" />
<issue id="2024-26744" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>jdelvare</packager>
<reboot_needed/>
<description>The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).
- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2021-47041: Don't set sk_user_data without write_lock (bsc#1220755).
- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).
The following non-security bugs were fixed:
- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
- tls: Fix context leak on tls_device_down (bsc#1221545).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>