[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2024:0900-1 -- SLES kernel, reiserfs-kmp-default

ID: oval:org.secpod.oval:def:89051808Date: (C)2024-04-26   (M)2024-05-09
Class: PATCHFamily: unix




The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts . * CVE-2023-52463: Fixed null pointer dereference in efivarfs . * CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend . * CVE-2023-28746: Fixed Register File Data Sampling . * CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 . * CVE-2024-26607: Fixed a probing race issue in sii902x: . * CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register . * CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach . * CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS . * CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range . * CVE-2024-26585: Fixed race between tx work scheduling and socket close . * CVE-2023-52340: Fixed ICMPv6 'Packet Too Big' packets force a DoS of the Linux kernel by forcing 100% CPU . * CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval . * CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk . * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control . * CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure . * CVE-2023-52452: Fixed Fix accesses to uninit stack slots . * CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get failed . * CVE-2023-52456: Fixed tx statemachine deadlock . * CVE-2023-52451: Fixed access beyond end of drmem array . * CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier . * CVE-2021-46923: Fixed reference leakage in fs/mount_setattr . * CVE-2023-52447: Fixed map_fd_put_ptr signature kABI workaround . * CVE-2024-26598: Fixed potential UAF in LPI translation cache . * CVE-2024-26603: Fixed infinite loop via #PF handling . * CVE-2023-52445: Fixed use after free on context disconnection . * CVE-2023-52439: Fixed use-after-free in uio_open . * CVE-2023-52443: Fixed crash when parsed profile name is empty . * CVE-2024-26602: Fixed overall slowdowns with sys_membarrier . * CVE-2024-26593: Fixed block process call transactions . * CVE-2024-26586: Fixed stack corruption . * CVE-2024-26595: Fixed NULL pointer dereference in error path . * CVE-2023-52464: Fixed possible out-of-bounds string access * CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump . * CVE-2024-1151: Fixed unlimited number of recursions from action sets . * CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction . * CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv . * CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm- table.c . * CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c . The following non-security bugs were fixed: * bpf: Fix verification of indirect var-off stack access . * bpf: Guard stack limits against 32bit overflow . * KVM: VMX: Move VERW closer to VMentry for MDS mitigation . * KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH . * NFS: avoid infinite loop in pnfs_update_layout . * nvme: move nvme_stop_keep_alive back to original position . * nvme: remove nvme_alloc_request and nvme_alloc_request_qid . * nvme: start keep-alive after admin queue setup . * x86/asm: Add _ASM_RIP macro for x86-64 suffix . * x86/bugs: Add asm helpers for executing VERW . * x86/bugs: Use ALTERNATIVE instead of mds_user_clear static key . * x86/entry_32: Add VERW just before userspace transition . * x86/entry_64: Add VERW just before userspace transition . ## Special Instructions and Notes: * Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Desktop 15 SP4
SUSE Linux Enterprise Server 15 SP4
Product:
kernel
reiserfs-kmp-default
Reference:
SUSE-SU-2024:0900-1
CVE-2019-25162
CVE-2021-46923
CVE-2021-46924
CVE-2021-46932
CVE-2021-46934
CVE-2021-47083
CVE-2022-48627
CVE-2023-28746
CVE-2023-5197
CVE-2023-52340
CVE-2023-52429
CVE-2023-52439
CVE-2023-52443
CVE-2023-52445
CVE-2023-52447
CVE-2023-52448
CVE-2023-52449
CVE-2023-52451
CVE-2023-52452
CVE-2023-52456
CVE-2023-52457
CVE-2023-52463
CVE-2023-52464
CVE-2023-52467
CVE-2023-52475
CVE-2023-52478
CVE-2023-52482
CVE-2023-52484
CVE-2023-52530
CVE-2023-52531
CVE-2023-52559
CVE-2023-6270
CVE-2023-6817
CVE-2024-0607
CVE-2024-1151
CVE-2024-23849
CVE-2024-23850
CVE-2024-23851
CVE-2024-26585
CVE-2024-26586
CVE-2024-26589
CVE-2024-26591
CVE-2024-26593
CVE-2024-26595
CVE-2024-26598
CVE-2024-26602
CVE-2024-26603
CVE-2024-26607
CVE-2024-26622
CVE    49
CVE-2023-52340
CVE-2023-5197
CVE-2024-0607
CVE-2023-6817
...
CPE    4
cpe:/o:linux:linux_kernel
cpe:/a:kmp:reiserfs_kmp_default
cpe:/o:suse:suse_linux_enterprise_server:15:sp4
cpe:/o:suse:suse_linux_enterprise_desktop:15:sp4
...

© SecPod Technologies