File _patchinfo of Package patchinfo.32926
<patchinfo incident="32926">
<issue id="1211515" tracker="bnc">Partner-L3: NVMe-oF TCP: mount mapped volumes over network latency is very slow</issue>
<issue id="1213456" tracker="bnc">VUL-0: EMBARGOED: CVE-2023-28746: CPU: Register File Data Sampling</issue>
<issue id="1214064" tracker="bnc">Partner-L3: tasks are not progressing due to syscall on NVME stuck - SLES 15.4</issue>
<issue id="1218195" tracker="bnc">VUL-0: CVE-2023-6817: kernel: use-after-free in nft_pipapo_walk</issue>
<issue id="1218216" tracker="bnc">VUL-0: CVE-2023-5197: kernel: use-after-free due to addition and removal of rules from chain bindings within the same transaction</issue>
<issue id="1218562" tracker="bnc">VUL-0: CVE-2023-6270: kernel: use-after-free vulnerability in ATA over Ethernet (AoE) driver</issue>
<issue id="1218915" tracker="bnc">VUL-0: CVE-2024-0607: kernel: nf_tables: pointer math issue in nft_byteorder_eval()</issue>
<issue id="1219073" tracker="bnc">[mdadm] system crashed during md raid device attach/detach operations</issue>
<issue id="1219126" tracker="bnc">VUL-0: CVE-2024-23850: kernel: in btrfs_get_root_ref in fs/btrfs/disk-io.c there can be an assertion failure leading to DoS</issue>
<issue id="1219127" tracker="bnc">VUL-0: CVE-2024-23849: kernel: in rds_recv_track_latency in net/rds/af_rds.c an off-by-one error results in out-of bounds access</issue>
<issue id="1219146" tracker="bnc">VUL-0: CVE-2024-23851: kernel: copy_params in drivers/md/dm-ioctl.c can lead to crash</issue>
<issue id="1219295" tracker="bnc">VUL-0: CVE-2023-52340: kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU</issue>
<issue id="1219633" tracker="bnc">L3: L3-Question: kernel workqueue and soft lockups for extended periods with NFS involved in backtraces</issue>
<issue id="1219653" tracker="bnc">Enable CONFIG_GDB_SCRIPTS</issue>
<issue id="1219827" tracker="bnc">VUL-0: CVE-2023-52429: kernel-source,kernel-source-azure,kernel-source-rt: potential DoS in dm_table_create in drivers/md/dm-table.c</issue>
<issue id="1219835" tracker="bnc">VUL-0: CVE-2024-1151: kernel-source,kernel-source-azure,kernel-source-rt: kernel: stack overflow problem in Open vSwitch kernel module leading to DoS</issue>
<issue id="1220009" tracker="bnc">VUL-1: CVE-2024-26593: kernel: i2c: i801: missing data buffer index reset could lead to a data leakage</issue>
<issue id="1220140" tracker="bnc">VUL-0: CVE-2023-52439: kernel-source,kernel-source-azure,kernel-source-rt: use-after-free in uio_open</issue>
<issue id="1220187" tracker="bnc">VUL-0: CVE-2024-26585: kernel-source,kernel-source-azure,kernel-source-rt: tls: race condition between tx work scheduling and socket close</issue>
<issue id="1220238" tracker="bnc">VUL-0: CVE-2023-52449: kernel: mtd: Fix gluebi NULL pointer dereference caused by ftl notifier</issue>
<issue id="1220240" tracker="bnc">VUL-0: CVE-2023-52443: kernel-source,kernel-source-azure,kernel-source-rt: apparmor: crash when parsed profile name is empty</issue>
<issue id="1220241" tracker="bnc">VUL-0: CVE-2023-52445: kernel-source,kernel-source-azure,kernel-source-rt: media: pvrusb2: fix use after free on context disconnection</issue>
<issue id="1220243" tracker="bnc">VUL-0: CVE-2024-26586: kernel-source,kernel-source-azure,kernel-source-rt: mlxsw: spectrum_acl_tcam: stack corruption via an excessive number of ACLs</issue>
<issue id="1220250" tracker="bnc">VUL-0: CVE-2023-52451: kernel-source,kernel-source-azure,kernel-source-rt: powerpc/pseries/memhp: out of bounds read when doing a memory hotplug remove of an invalid address</issue>
<issue id="1220251" tracker="bnc">VUL-0: CVE-2023-52447: kernel-source,kernel-source-azure,kernel-source-rt: bpf: Defer the free of inner map when necessary</issue>
<issue id="1220253" tracker="bnc">VUL-0: CVE-2023-52448: kernel-source,kernel-source-azure,kernel-source-rt: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump</issue>
<issue id="1220254" tracker="bnc">VUL-0: CVE-2024-26591: kernel-source,kernel-source-azure,kernel-source-rt: bpf: fix re-attachment branch in bpf_tracing_prog_attach</issue>
<issue id="1220255" tracker="bnc">VUL-0: CVE-2024-26589: kernel-source,kernel-source-azure,kernel-source-rt: bpf: out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS</issue>
<issue id="1220257" tracker="bnc">VUL-0: CVE-2023-52452: kernel-source,kernel-source-azure,kernel-source-rt: bpf: Fix accesses to uninit stack slots</issue>
<issue id="1220326" tracker="bnc">VUL-0: CVE-2024-26598: kernel-source,kernel-source-azure,kernel-source-rt: kvm: Avoid potential UAF in LPI translation cache</issue>
<issue id="1220328" tracker="bnc">VUL-0: CVE-2023-52463: kernel: efivarfs: force RO when remounting if SetVariable is not supported</issue>
<issue id="1220330" tracker="bnc">VUL-0: CVE-2023-52464: kernel: EDAC/thunderx: Fix possible out-of-bounds string access</issue>
<issue id="1220335" tracker="bnc">VUL-0: CVE-2024-26603: kernel: x86/fpu: user-defined xsave buffer size can lead to infinite loop via #PF handling</issue>
<issue id="1220344" tracker="bnc">VUL-0: CVE-2024-26595: kernel-source,kernel-source-azure,kernel-source-rt: mlxsw: spectrum_acl_tcam: NULL pointer dereference in error path</issue>
<issue id="1220350" tracker="bnc">VUL-0: CVE-2023-52457: kernel-source,kernel-source-azure,kernel-source-rt: serial 8250 omap don't skip resource freeing if pm_runtime_resume_and_get() failed</issue>
<issue id="1220364" tracker="bnc">VUL-0: CVE-2023-52456: kernel-source,kernel-source-azure,kernel-source-rt: imx: fix tx statemachine deadlock</issue>
<issue id="1220398" tracker="bnc">VUL-0: CVE-2024-26602: kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier</issue>
<issue id="1220409" tracker="bnc">VUL-0: CVE-2019-25162: kernel-source,kernel-source-azure,kernel-source-rt: i2c: Fix a potential use after free</issue>
<issue id="1220433" tracker="bnc">VUL-0: CVE-2023-52467: kernel: mfd: syscon: potential NULL pointer dereference in of_syscon_register()</issue>
<issue id="1220444" tracker="bnc">VUL-0: CVE-2021-46932: kernel-source,kernel-source-azure,kernel-source-rt: input: appletouch: missing work initialization before device registration</issue>
<issue id="1220457" tracker="bnc">VUL-0: CVE-2021-46923: kernel-source,kernel-source-azure,kernel-source-rt: fs/mount_setattr: always cleanup mount_kattr</issue>
<issue id="1220459" tracker="bnc">VUL-0: CVE-2021-46924: kernel-source,kernel-source-azure,kernel-source-rt: NFC: st21nfca: fix memory leak in device probe and remove</issue>
<issue id="1220469" tracker="bnc">VUL-0: CVE-2021-46934: kernel-source,kernel-source-azure,kernel-source-rt: i2c: wrong user data may cause warning in i2c_transfer()</issue>
<issue id="1220649" tracker="bnc">VUL-0: CVE-2023-52475: kernel: Input: powermate: fix use-after-free in powermate_config_complete</issue>
<issue id="1220735" tracker="bnc">VUL-0: CVE-2023-52482: kernel: x86/srso: speculative return stack overflow in Hygon processors</issue>
<issue id="1220736" tracker="bnc">VUL-0: CVE-2024-26607: kernel: drm/bridge: sii902x: probing race condition leads to NULL pointer dereference</issue>
<issue id="1220796" tracker="bnc">VUL-0: CVE-2023-52478: kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect</issue>
<issue id="1220797" tracker="bnc">VUL-0: CVE-2023-52484: kernel: iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range</issue>
<issue id="1220825" tracker="bnc">VUL-0: CVE-2024-26622: kernel: tomoyo: use after free in in tomoyo_write_control()</issue>
<issue id="1220845" tracker="bnc">VUL-0: CVE-2022-48627: kernel: vt: fix memory overlapping when deleting chars in the buffer</issue>
<issue id="1220917" tracker="bnc">VUL-0: CVE-2021-47083: kernel: pinctrl: mediatek: fix global-out-of-bounds issue</issue>
<issue id="1220930" tracker="bnc">VUL-0: CVE-2023-52530: kernel: wifi: mac80211: fix potential key use-after-free</issue>
<issue id="1220931" tracker="bnc">VUL-0: CVE-2023-52531: kernel: wifi: iwlwifi: mvm: Fix a memory corruption issue</issue>
<issue id="1220933" tracker="bnc">VUL-0: CVE-2023-52559: kernel: iommu/vt-d: Avoid memory allocation in iommu_suspend()</issue>
<issue id="2023-6270" tracker="cve" />
<issue id="2023-52463" tracker="cve" />
<issue id="2023-52559" tracker="cve" />
<issue id="2023-28746" tracker="cve" />
<issue id="2021-46934" tracker="cve" />
<issue id="2023-52530" tracker="cve" />
<issue id="2023-52531" tracker="cve" />
<issue id="2021-47083" tracker="cve" />
<issue id="2024-26607" tracker="cve" />
<issue id="2022-48627" tracker="cve" />
<issue id="2023-52482" tracker="cve" />
<issue id="2023-52467" tracker="cve" />
<issue id="2024-26591" tracker="cve" />
<issue id="2024-26589" tracker="cve" />
<issue id="2023-52484" tracker="cve" />
<issue id="2024-26585" tracker="cve" />
<issue id="2023-52340" tracker="cve" />
<issue id="2024-0607" tracker="cve" />
<issue id="2023-6817" tracker="cve" />
<issue id="2024-26622" tracker="cve" />
<issue id="2024-23850" tracker="cve" />
<issue id="2023-52452" tracker="cve" />
<issue id="2023-52457" tracker="cve" />
<issue id="2023-52456" tracker="cve" />
<issue id="2023-52451" tracker="cve" />
<issue id="2021-46932" tracker="cve" />
<issue id="2019-25162" tracker="cve" />
<issue id="2023-52449" tracker="cve" />
<issue id="2021-46923" tracker="cve" />
<issue id="2023-52447" tracker="cve" />
<issue id="2023-52478" tracker="cve" />
<issue id="2023-52475" tracker="cve" />
<issue id="2024-26598" tracker="cve" />
<issue id="2024-26603" tracker="cve" />
<issue id="2021-46924" tracker="cve" />
<issue id="2023-52445" tracker="cve" />
<issue id="2023-52439" tracker="cve" />
<issue id="2023-52443" tracker="cve" />
<issue id="2024-26602" tracker="cve" />
<issue id="2024-26593" tracker="cve" />
<issue id="2024-26586" tracker="cve" />
<issue id="2024-26595" tracker="cve" />
<issue id="2023-52464" tracker="cve" />
<issue id="2023-52448" tracker="cve" />
<issue id="2024-1151" tracker="cve" />
<issue id="2023-5197" tracker="cve" />
<issue id="2024-23849" tracker="cve" />
<issue id="2023-52429" tracker="cve" />
<issue id="2024-23851" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>alix82</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).
- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).
- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).
- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).
The following non-security bugs were fixed:
- bpf: Fix verification of indirect var-off stack access (git-fixes).
- bpf: Guard stack limits against 32bit overflow (git-fixes).
- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).
- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: remove nvme_alloc_request and nvme_alloc_request_qid (bsc#1214064).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: Add asm helpers for executing VERW (git-fixes).
- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).
- x86/entry_32: Add VERW just before userspace transition (git-fixes).
- x86/entry_64: Add VERW just before userspace transition (git-fixes).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>