SUSE-SU-2024:0478-1 -- SLES kernel, reiserfs-kmp-defaultID: oval:org.secpod.oval:def:89051471 | Date: (C)2024-04-26 (M)2024-04-29 |
Class: PATCH | Family: unix |
The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation . * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure . * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c . * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c . * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete . * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request . * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec . * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family values within `nf_tables_newtable` function . * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition . * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition . * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c . * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation . * CVE-2023-47233: Fixed a use-after-free in the device unplugging code inside the brcm80211 component . * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment . * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end . The following non-security bugs were fixed: * build: Limit kernel-source build to architectures for which the kernel binary is built . * docs: Store the old kernel changelog entries in kernel-docs package * mkspec: Include constraints for both multibuild and plain package always * rpm/kernel-docs.spec.in: fix build with 6.8 Since upstream commit f061c9f7d058 * rpm/kernel-source.rpmlintrc: add action-ebpf Upstream commit a79d8ba734bd * rpm/mkspec: use kernel-source: prefix for constraints on multibuild Otherwise the constraints are not applied with multibuild enabled. * x86/entry/ia32: Ensure s32 is sign extended to s64 . ## Special Instructions and Notes: * Please reboot the system after installing this update.
Platform: |
SUSE Linux Enterprise Server 15 SP2 |
Product: |
kernel |
reiserfs-kmp-default |