[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2024:0515-1 -- SLES kernel, reiserfs-kmp-default

ID: oval:org.secpod.oval:def:89051804Date: (C)2024-04-26   (M)2024-05-09
Class: PATCHFamily: unix




The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate function . * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation . * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c . * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition . * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment . * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end . * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request . * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete . * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec . * CVE-2023-47233: Fixed a use-after-free in the device unplugging code inside the brcm80211 component . * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation . * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c . * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure . * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family values within `nf_tables_newtable` function . * CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c . * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c . * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c . * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition . * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg . * CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set . The following non-security bugs were fixed: * Store the old kernel changelog entries in kernel-docs package . * bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent . * bcache: Remove unnecessary NULL point check in node allocations . * bcache: add code comments for bch_btree_node_get and __bch_btree_node_alloc . * bcache: avoid NULL checking to c- greater thanroot in run_cache_set . * bcache: avoid oversize memory allocation by small stripe_size . * bcache: check return value from btree_node_alloc_replacement . * bcache: fixup btree_cache_wait list damage . * bcache: fixup init dirty data errors . * bcache: fixup lock c- greater thanroot error . * bcache: fixup multi-threaded bch_sectors_dirty_init wake-up race . * bcache: prevent potential division by zero error . * bcache: remove redundant assignment to variable cur_idx . * bcache: replace a mistaken IS_ERR by IS_ERR_OR_NULL in btree_gc_coalesce . * bcache: revert replacing IS_ERR_OR_NULL with IS_ERR . * block: Fix kabi header include . * block: free the extended dev_t minor later . * clocksource: Skip watchdog check for large watchdog intervals . * clocksource: disable watchdog checks on TSC when TSC is watchdog . * dm cache policy smq: ensure IO does not prevent cleaner policy progress . * dm cache: add cond_resched to various workqueue loops . * dm clone: call kmem_cache_destroy in dm_clone_init error path . * dm crypt: add cond_resched to dmcrypt_write . * dm crypt: avoid accessing uninitialized tasklet . * dm flakey: do not corrupt the zero page . * dm flakey: fix a crash with invalid table line . * dm flakey: fix logic when corrupting a bio . * dm init: add dm-mod.waitfor to wait for asynchronously probed block devices . * dm integrity: call kmem_cache_destroy in dm_integrity_init error path . * dm integrity: reduce vmalloc space footprint on 32-bit architectures . * dm raid: clean up four equivalent goto tags in raid_ctr . * dm raid: fix missing reconfig_mutex unlock in raid_ctr error paths . * dm stats: check for and propagate alloc_percpu failure . * dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client . * dm thin metadata: check fail_io before using data_sm . * dm thin: add cond_resched to various workqueue loops . * dm thin: fix deadlock when swapping to thin device . * dm verity: do not perform FEC for failed readahead IO . * dm verity: fix error handling for check_at_most_once on FEC . * dm verity: skip redundant verity_handle_err on I/O errors . * dm zoned: free dmz- greater thanddev array in dmz_put_zoned_devices . * dm-delay: fix a race between delay_presuspend and delay_bio . * dm-integrity: do not modify bio"s immutable bio_vec in integrity_metadata . * dm-verity: align struct dm_verity_fec_io properly . * dm: add cond_resched to dm_wq_work . * dm: do not lock fs when the map is NULL during suspend or resume . * dm: do not lock fs when the map is NULL in process of resume . * dm: remove flush_scheduled_work during local_exit . * dm: send just one event on resize, not two . * doc/README.KSYMS: Add to repo. * hv_netvsc: rndis_filter needs to select NLS . * intel_idle: add Emerald Rapids Xeon support . * kabi, vmstat: skip periodic vmstat update for isolated CPUs . * loop: suppress uevents while reconfiguring the device . * nbd: Fix debugfs_create_dir error checking . * nbd: fix incomplete validation of ioctl arg . * nbd: use the correct block_device in nbd_bdev_reset . * nfsd: fix RELEASE_LOCKOWNER . * nfsd4: add refcount for nfsd4_blocked_lock . * null_blk: Always check queue mode setting from configfs . * powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR- IOV device . * rbd: avoid use-after-free in do_rbd_add when rbd_dev_create fails . * rbd: decouple header read-in from updating rbd_dev- greater thanheader . * rbd: decouple parent info read-in from updating rbd_dev . * rbd: get snapshot context after exclusive lock is ensured to be held . * rbd: harden get_lock_owner_info a bit . * rbd: make get_lock_owner_info return a single locker or NULL . * rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting . * rbd: move rbd_dev_refresh definition . * rbd: prevent busy loop when requesting exclusive lock . * rbd: retrieve and check lock owner twice before blocklisting . * rbd: take header_rwsem in rbd_dev_refresh only when updating . * sched/isolation: add cpu_is_isolated API . * scsi: ibmvfc: Implement channel queue depth and event buffer accounting . * scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool . * trace,smp: Add tracepoints around remotelly called functions . * vmstat: skip periodic vmstat update for isolated CPUs . ## Special Instructions and Notes: * Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Desktop 15 SP4
SUSE Linux Enterprise Server 15 SP4
Product:
kernel
reiserfs-kmp-default
Reference:
SUSE-SU-2024:0515-1
CVE-2021-33631
CVE-2023-46838
CVE-2023-47233
CVE-2023-4921
CVE-2023-51042
CVE-2023-51043
CVE-2023-51780
CVE-2023-51782
CVE-2023-6040
CVE-2023-6356
CVE-2023-6535
CVE-2023-6536
CVE-2023-6915
CVE-2024-0340
CVE-2024-0565
CVE-2024-0641
CVE-2024-0775
CVE-2024-1085
CVE-2024-1086
CVE-2024-24860
CVE    20
CVE-2023-4921
CVE-2023-47233
CVE-2023-6040
CVE-2023-51042
...
CPE    4
cpe:/a:kmp:reiserfs_kmp_default
cpe:/o:linux:linux_kernel
cpe:/o:suse:suse_linux_enterprise_server:15:sp4
cpe:/o:suse:suse_linux_enterprise_desktop:15:sp4
...

© SecPod Technologies