[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2024:0478-1 -- SLES kernel, reiserfs-kmp-default

ID: oval:org.secpod.oval:def:89051471Date: (C)2024-04-26   (M)2024-04-29
Class: PATCHFamily: unix




The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation . * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure . * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c . * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c . * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete . * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request . * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec . * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family values within `nf_tables_newtable` function . * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition . * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition . * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c . * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation . * CVE-2023-47233: Fixed a use-after-free in the device unplugging code inside the brcm80211 component . * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment . * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end . The following non-security bugs were fixed: * build: Limit kernel-source build to architectures for which the kernel binary is built . * docs: Store the old kernel changelog entries in kernel-docs package * mkspec: Include constraints for both multibuild and plain package always * rpm/kernel-docs.spec.in: fix build with 6.8 Since upstream commit f061c9f7d058 * rpm/kernel-source.rpmlintrc: add action-ebpf Upstream commit a79d8ba734bd * rpm/mkspec: use kernel-source: prefix for constraints on multibuild Otherwise the constraints are not applied with multibuild enabled. * x86/entry/ia32: Ensure s32 is sign extended to s64 . ## Special Instructions and Notes: * Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 15 SP2
Product:
kernel
reiserfs-kmp-default
Reference:
SUSE-SU-2024:0478-1
CVE-2021-33631
CVE-2023-46838
CVE-2023-47233
CVE-2023-4921
CVE-2023-51043
CVE-2023-51780
CVE-2023-51782
CVE-2023-6040
CVE-2023-6356
CVE-2023-6535
CVE-2023-6536
CVE-2023-6915
CVE-2024-0565
CVE-2024-0775
CVE-2024-1086
CVE    15
CVE-2023-4921
CVE-2023-47233
CVE-2023-46838
CVE-2023-6040
...
CPE    3
cpe:/a:kmp:reiserfs_kmp_default
cpe:/o:linux:linux_kernel
cpe:/o:suse:suse_linux_enterprise_server:15:sp2

© SecPod Technologies