[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2024:0474-1 -- SLES kernel, reiserfs-kmp-default

ID: oval:org.secpod.oval:def:89051800Date: (C)2024-04-26   (M)2024-04-29
Class: PATCHFamily: unix




The SUSE Linux Enterprise 15 SP3 LTSS kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation . * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition . * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment . * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end . * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request . * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete . * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec . * CVE-2023-47233: Fixed a use-after-free in the device unplugging code inside the brcm80211 component . * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation . * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c . * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure . * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c . * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c . * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family values within `nf_tables_newtable` function . * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition . The following non-security bugs were fixed: * Limit kernel-source build to architectures for which the kernel binary is built . * x86/entry/ia32: Ensure s32 is sign extended to s64 . ## Special Instructions and Notes: * Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 15 SP3
Product:
kernel
reiserfs-kmp-default
Reference:
SUSE-SU-2024:0474-1
CVE-2021-33631
CVE-2023-46838
CVE-2023-47233
CVE-2023-4921
CVE-2023-51043
CVE-2023-51780
CVE-2023-51782
CVE-2023-6040
CVE-2023-6356
CVE-2023-6535
CVE-2023-6536
CVE-2023-6915
CVE-2024-0565
CVE-2024-0775
CVE-2024-1086
CVE    15
CVE-2023-4921
CVE-2023-47233
CVE-2023-46838
CVE-2023-6040
...
CPE    3
cpe:/a:kmp:reiserfs_kmp_default
cpe:/o:linux:linux_kernel
cpe:/o:suse:suse_linux_enterprise_server:15:sp3

© SecPod Technologies