[SUSE-SU-2024:1641-1] Security update for the Linux Kernel
Severity
Important
CVEs
90
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP4 LTSS kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660).
The following non-security bugs were fixed:
- Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).
- ibmvfc: make 'max_sectors' a module option (bsc#1216223).
- scsi: Update max_hw_sectors on rescan (bsc#1216223).
- ID
- SUSE-SU-2024:1641-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20241641-1/
- Published
-
2024-05-14T13:37:08
(4 months ago) - Modified
-
2024-05-14T13:37:08
(4 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2022-1645
- ALAS-2023-1701
- ALAS-2024-1923
- ALAS-2024-1937
- ALAS2-2021-1727
- ALAS2-2022-1876
- ALAS2-2023-1987
- ALAS2-2024-2475
- ALAS2-2024-2542
- ALAS2-2024-2549
- ALAS2-2024-2584
- ALAS2-2024-2615
- ALSA-2024:3138
- ALSA-2024:3618
- ALSA-2024:5101
- DSA-5658-1
- DSA-5681-1
- DSA-5703-1
- ELSA-2024-12193
- ELSA-2024-12570
- ELSA-2024-12571
- ELSA-2024-12606
- ELSA-2024-12610
- ELSA-2024-12612
- ELSA-2024-2394
- ELSA-2024-2758
- ELSA-2024-3138
- ELSA-2024-3306
- ELSA-2024-3618
- ELSA-2024-4928
- ELSA-2024-5101
- FEDORA-2024-0eb4a61f45
- FEDORA-2024-5db5954a5e
- FEDORA-2024-c4ec5006e3
- FEDORA-2024-d16d94b00d
- FEDORA-2024-f797f1540e
- RHSA-2024:2950
- RHSA-2024:3138
- RHSA-2024:3618
- RHSA-2024:3627
- RHSA-2024:5101
- RHSA-2024:5102
- RLSA-2024:2758
- RLSA-2024:3138
- RLSA-2024:3618
- RLSA-2024:4928
- RLSA-2024:5101
- SSA:2023-325-01
- SSA:2024-157-01
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2024:0855-1
- SUSE-SU-2024:0858-1
- SUSE-SU-2024:0900-1
- SUSE-SU-2024:0900-2
- SUSE-SU-2024:0910-1
- SUSE-SU-2024:0977-1
- SUSE-SU-2024:1320-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1465-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:1642-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1644-1
- SUSE-SU-2024:1645-1
- SUSE-SU-2024:1646-1
- SUSE-SU-2024:1647-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1650-1
- SUSE-SU-2024:1659-1
- SUSE-SU-2024:1663-1
- SUSE-SU-2024:1669-1
- SUSE-SU-2024:1677-1
- SUSE-SU-2024:1679-1
- SUSE-SU-2024:1680-1
- SUSE-SU-2024:1682-1
- SUSE-SU-2024:1683-1
- SUSE-SU-2024:1685-1
- SUSE-SU-2024:1686-1
- SUSE-SU-2024:1692-1
- SUSE-SU-2024:1694-1
- SUSE-SU-2024:1695-1
- SUSE-SU-2024:1696-1
- SUSE-SU-2024:1705-1
- SUSE-SU-2024:1706-1
- SUSE-SU-2024:1707-1
- SUSE-SU-2024:1708-1
- SUSE-SU-2024:1709-1
- SUSE-SU-2024:1711-1
- SUSE-SU-2024:1712-1
- SUSE-SU-2024:1713-1
- SUSE-SU-2024:1719-1
- SUSE-SU-2024:1720-1
- SUSE-SU-2024:1723-1
- SUSE-SU-2024:1726-1
- SUSE-SU-2024:1729-1
- SUSE-SU-2024:1730-1
- SUSE-SU-2024:1731-1
- SUSE-SU-2024:1732-1
- SUSE-SU-2024:1735-1
- SUSE-SU-2024:1736-1
- SUSE-SU-2024:1738-1
- SUSE-SU-2024:1739-1
- SUSE-SU-2024:1740-1
- SUSE-SU-2024:1742-1
- SUSE-SU-2024:1746-1
- SUSE-SU-2024:1748-1
- SUSE-SU-2024:1749-1
- SUSE-SU-2024:1750-1
- SUSE-SU-2024:1751-1
- SUSE-SU-2024:1753-1
- SUSE-SU-2024:1757-1
- SUSE-SU-2024:1759-1
- SUSE-SU-2024:1760-1
- SUSE-SU-2024:1870-1
- SUSE-SU-2024:1979-1
- SUSE-SU-2024:1983-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2091-1
- SUSE-SU-2024:2092-1
- SUSE-SU-2024:2094-1
- SUSE-SU-2024:2100-1
- SUSE-SU-2024:2101-1
- SUSE-SU-2024:2109-1
- SUSE-SU-2024:2120-1
- SUSE-SU-2024:2121-1
- SUSE-SU-2024:2124-1
- SUSE-SU-2024:2130-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2139-1
- SUSE-SU-2024:2148-1
- SUSE-SU-2024:2156-1
- SUSE-SU-2024:2162-1
- SUSE-SU-2024:2163-1
- SUSE-SU-2024:2164-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2184-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2191-1
- SUSE-SU-2024:2203-1
- SUSE-SU-2024:2207-1
- SUSE-SU-2024:2208-1
- SUSE-SU-2024:2209-1
- SUSE-SU-2024:2216-1
- SUSE-SU-2024:2217-1
- SUSE-SU-2024:2326-1
- SUSE-SU-2024:2335-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2338-1
- SUSE-SU-2024:2341-1
- SUSE-SU-2024:2342-1
- SUSE-SU-2024:2343-1
- SUSE-SU-2024:2344-1
- SUSE-SU-2024:2357-1
- SUSE-SU-2024:2358-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2368-1
- SUSE-SU-2024:2373-1
- SUSE-SU-2024:2381-1
- SUSE-SU-2024:2382-1
- SUSE-SU-2024:2396-1
- SUSE-SU-2024:2437-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2447-1
- SUSE-SU-2024:2448-1
- SUSE-SU-2024:2472-1
- SUSE-SU-2024:2473-1
- SUSE-SU-2024:2487-1
- SUSE-SU-2024:2488-1
- SUSE-SU-2024:2493-1
- SUSE-SU-2024:2530-1
- SUSE-SU-2024:2549-1
- SUSE-SU-2024:2558-1
- SUSE-SU-2024:2561-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2725-1
- SUSE-SU-2024:2740-1
- SUSE-SU-2024:2751-1
- SUSE-SU-2024:2755-1
- SUSE-SU-2024:2758-1
- SUSE-SU-2024:2773-1
- SUSE-SU-2024:2821-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2825-1
- SUSE-SU-2024:2840-1
- SUSE-SU-2024:2843-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2851-1
- SUSE-SU-2024:2892-1
- SUSE-SU-2024:2893-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2895-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2923-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2947-1
- SUSE-SU-2024:2948-1
- SUSE-SU-2024:2973-1
- SUSE-SU-2024:3034-1
- SUSE-SU-2024:3037-1
- SUSE-SU-2024:3043-1
- SUSE-SU-2024:3044-1
- SUSE-SU-2024:3048-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6441-1
- USN-6441-2
- USN-6441-3
- USN-6442-1
- USN-6443-1
- USN-6444-1
- USN-6444-2
- USN-6445-1
- USN-6445-2
- USN-6446-1
- USN-6446-2
- USN-6446-3
- USN-6454-1
- USN-6454-2
- USN-6454-3
- USN-6454-4
- USN-6466-1
- USN-6479-1
- USN-6645-1
- USN-6646-1
- USN-6647-1
- USN-6647-2
- USN-6688-1
- USN-6724-1
- USN-6724-2
- USN-6725-1
- USN-6725-2
- USN-6765-1
- USN-6766-1
- USN-6766-2
- USN-6766-3
- USN-6767-1
- USN-6767-2
- USN-6774-1
- USN-6776-1
- USN-6777-1
- USN-6777-2
- USN-6777-3
- USN-6777-4
- USN-6778-1
- USN-6795-1
- USN-6816-1
- USN-6817-1
- USN-6817-2
- USN-6817-3
- USN-6818-1
- USN-6818-2
- USN-6818-3
- USN-6818-4
- USN-6819-1
- USN-6819-2
- USN-6819-3
- USN-6819-4
- USN-6820-1
- USN-6820-2
- USN-6821-1
- USN-6821-2
- USN-6821-3
- USN-6821-4
- USN-6828-1
- USN-6831-1
- USN-6865-1
- USN-6866-1
- USN-6866-2
- USN-6866-3
- USN-6867-1
- USN-6871-1
- USN-6878-1
- USN-6892-1
- USN-6895-1
- USN-6895-2
- USN-6895-3
- USN-6895-4
- USN-6896-1
- USN-6896-2
- USN-6896-3
- USN-6896-4
- USN-6896-5
- USN-6898-1
- USN-6898-2
- USN-6898-3
- USN-6898-4
- USN-6900-1
- USN-6917-1
- USN-6919-1
- USN-6921-1
- USN-6921-2
- USN-6923-1
- USN-6923-2
- USN-6924-1
- USN-6924-2
- USN-6927-1
- USN-6938-1
- USN-6952-1
- USN-6952-2
- USN-6953-1
- USN-6956-1
- USN-6957-1
- USN-6972-1
- USN-6972-2
- USN-6972-3
- USN-6972-4
- USN-6976-1
- USN-6979-1
- USN-6999-1
- USN-7004-1
- USN-7005-1
- USN-7005-2
- USN-7007-1
- USN-7008-1
- USN-7009-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |