[SUSE-SU-2024:2365-1] Security update for the Linux Kernel
Severity
Important
CVEs
38
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47247: net/mlx5e: Fix use-after-free of encap entry in neigh update handler (bsc#1224865).
- CVE-2021-47311: net: qcom/emac: fix UAF in emac_remove (bsc#1225010).
- CVE-2021-47368: enetc: Fix illegal access when reading affinity_hint (bsc#1225161).
- CVE-2021-47372: net: macb: fix use after free on rmmod (bsc#1225184).
- CVE-2021-47379: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd (bsc#1225203).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2022-2938: psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1202623).
- CVE-2022-48760: USB: core: Fix hang in usb_kill_urb by adding memory barriers (bsc#1226712).
- CVE-2023-52707: sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1225109).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1224703).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595)
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226758).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
The following non-security bugs were fixed:
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: speed up chain-list searching (bsc#1219224).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
- x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).
- ID
- SUSE-SU-2024:2365-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
- Published
-
2024-07-09T14:03:50
(2 months ago) - Modified
-
2024-07-09T14:03:50
(2 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2022-1571
- ALAS-2024-1899
- ALAS2-2022-1761
- ALAS2-2024-2391
- ALAS2-2024-2581
- ALSA-2022:0825
- ALSA-2022:1988
- ALSA-2022:7683
- ALSA-2024:3138
- ALSA-2024:4211
- ALSA-2024:5101
- DSA-5092-1
- DSA-5096-1
- DSA-5680-1
- DSA-5681-1
- DSA-5703-1
- DSA-5730-1
- DSA-5731-1
- ELSA-2022-0620
- ELSA-2022-0825
- ELSA-2022-1988
- ELSA-2022-7683
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2024-12581
- ELSA-2024-12584
- ELSA-2024-12585
- ELSA-2024-12606
- ELSA-2024-12610
- ELSA-2024-12611
- ELSA-2024-12612
- ELSA-2024-2394
- ELSA-2024-3138
- ELSA-2024-4211
- ELSA-2024-4583
- ELSA-2024-5101
- ELSA-2024-5363
- FEDORA-2022-6f887c7be7
- FEDORA-2022-df17aabb12
- MS:CVE-2021-43389
- MS:CVE-2022-0435
- MS:CVE-2022-2938
- MS:CVE-2023-24023
- openSUSE-SU-2020:1153-1
- openSUSE-SU-2020:1236-1
- openSUSE-SU-2021:0242-1
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3806-1
- openSUSE-SU-2022:0363-1
- openSUSE-SU-2022:0370-1
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2022:0819
- RHSA-2022:0825
- RHSA-2022:0849
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2024:2950
- RHSA-2024:3138
- RHSA-2024:4211
- RHSA-2024:4352
- RHSA-2024:5101
- RHSA-2024:5102
- RLSA-2022:1988
- RLSA-2022:7683
- RLSA-2022:819
- RLSA-2024:3138
- RLSA-2024:4211
- RLSA-2024:4583
- RLSA-2024:5101
- SSA:2022-031-01
- SSA:2022-067-01
- SUSE-SU-2020:2102-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2119-1
- SUSE-SU-2020:2122-1
- SUSE-SU-2020:2134-1
- SUSE-SU-2020:2152-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2020:2541-1
- SUSE-SU-2020:2575-1
- SUSE-SU-2020:2605-1
- SUSE-SU-2020:2610-1
- SUSE-SU-2020:2623-1
- SUSE-SU-2021:3640-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3658-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3754-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2022:0363-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0365-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0370-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0372-1
- SUSE-SU-2022:0418-1
- SUSE-SU-2022:0429-1
- SUSE-SU-2022:0436-1
- SUSE-SU-2022:0463-1
- SUSE-SU-2022:0543-1
- SUSE-SU-2022:0544-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:1172-1
- SUSE-SU-2022:1189-1
- SUSE-SU-2022:1193-1
- SUSE-SU-2022:1194-1
- SUSE-SU-2022:1212-1
- SUSE-SU-2022:1223-1
- SUSE-SU-2022:1242-1
- SUSE-SU-2022:1246-1
- SUSE-SU-2022:1278-1
- SUSE-SU-2022:1593-1
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2024:1979-1
- SUSE-SU-2024:1983-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2011-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2184-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2203-1
- SUSE-SU-2024:2326-1
- SUSE-SU-2024:2335-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2338-1
- SUSE-SU-2024:2341-1
- SUSE-SU-2024:2342-1
- SUSE-SU-2024:2343-1
- SUSE-SU-2024:2344-1
- SUSE-SU-2024:2351-1
- SUSE-SU-2024:2357-1
- SUSE-SU-2024:2358-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2362-1
- SUSE-SU-2024:2368-1
- SUSE-SU-2024:2369-1
- SUSE-SU-2024:2372-1
- SUSE-SU-2024:2373-1
- SUSE-SU-2024:2381-1
- SUSE-SU-2024:2382-1
- SUSE-SU-2024:2384-1
- SUSE-SU-2024:2385-1
- SUSE-SU-2024:2394-1
- SUSE-SU-2024:2396-1
- SUSE-SU-2024:2407-1
- SUSE-SU-2024:2410-1
- SUSE-SU-2024:2411-1
- SUSE-SU-2024:2437-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2447-1
- SUSE-SU-2024:2448-1
- SUSE-SU-2024:2449-1
- SUSE-SU-2024:2472-1
- SUSE-SU-2024:2473-1
- SUSE-SU-2024:2474-1
- SUSE-SU-2024:2480-1
- SUSE-SU-2024:2487-1
- SUSE-SU-2024:2488-1
- SUSE-SU-2024:2495-1
- SUSE-SU-2024:2530-1
- SUSE-SU-2024:2549-1
- SUSE-SU-2024:2558-1
- SUSE-SU-2024:2559-1
- SUSE-SU-2024:2561-1
- SUSE-SU-2024:2571-1
- SUSE-SU-2024:2719-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2723-1
- SUSE-SU-2024:2724-1
- SUSE-SU-2024:2725-1
- SUSE-SU-2024:2726-1
- SUSE-SU-2024:2734-1
- SUSE-SU-2024:2740-1
- SUSE-SU-2024:2750-1
- SUSE-SU-2024:2751-1
- SUSE-SU-2024:2755-1
- SUSE-SU-2024:2758-1
- SUSE-SU-2024:2759-1
- SUSE-SU-2024:2760-1
- SUSE-SU-2024:2771-1
- SUSE-SU-2024:2773-1
- SUSE-SU-2024:2792-1
- SUSE-SU-2024:2793-1
- SUSE-SU-2024:2797-1
- SUSE-SU-2024:2802-1
- SUSE-SU-2024:2815-1
- SUSE-SU-2024:2818-1
- SUSE-SU-2024:2821-1
- SUSE-SU-2024:2822-1
- SUSE-SU-2024:2823-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2825-1
- SUSE-SU-2024:2827-1
- SUSE-SU-2024:2840-1
- SUSE-SU-2024:2841-1
- SUSE-SU-2024:2843-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2851-1
- SUSE-SU-2024:2852-1
- SUSE-SU-2024:2853-1
- SUSE-SU-2024:2874-1
- SUSE-SU-2024:2892-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2895-1
- SUSE-SU-2024:2896-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2902-1
- SUSE-SU-2024:2923-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2939-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2947-1
- SUSE-SU-2024:2948-1
- SUSE-SU-2024:2973-1
- SUSE-SU-2024:3015-1
- SUSE-SU-2024:3034-1
- SUSE-SU-2024:3037-1
- SUSE-SU-2024:3039-1
- SUSE-SU-2024:3043-1
- SUSE-SU-2024:3044-1
- SUSE-SU-2024:3048-1
- USN-4657-1
- USN-4658-1
- USN-4659-1
- USN-4680-1
- USN-4752-1
- USN-5139-1
- USN-5165-1
- USN-5208-1
- USN-5209-1
- USN-5210-1
- USN-5218-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5302-1
- USN-5337-1
- USN-5338-1
- USN-5339-1
- USN-5343-1
- USN-5362-1
- USN-5368-1
- USN-5377-1
- USN-6739-1
- USN-6740-1
- USN-6741-1
- USN-6742-1
- USN-6742-2
- USN-6816-1
- USN-6817-1
- USN-6817-2
- USN-6817-3
- USN-6878-1
- USN-6893-1
- USN-6893-2
- USN-6893-3
- USN-6895-1
- USN-6895-2
- USN-6895-3
- USN-6895-4
- USN-6896-1
- USN-6896-2
- USN-6896-3
- USN-6896-4
- USN-6896-5
- USN-6898-1
- USN-6898-2
- USN-6898-3
- USN-6898-4
- USN-6900-1
- USN-6917-1
- USN-6918-1
- USN-6919-1
- USN-6923-1
- USN-6923-2
- USN-6926-1
- USN-6926-2
- USN-6926-3
- USN-6927-1
- USN-6938-1
- USN-6949-1
- USN-6949-2
- USN-6950-1
- USN-6950-2
- USN-6950-3
- USN-6950-4
- USN-6951-1
- USN-6951-2
- USN-6951-3
- USN-6951-4
- USN-6952-1
- USN-6952-2
- USN-6953-1
- USN-6955-1
- USN-6956-1
- USN-6957-1
- USN-6972-1
- USN-6972-2
- USN-6972-3
- USN-6972-4
- USN-6973-1
- USN-6973-2
- USN-6973-3
- USN-6973-4
- USN-6974-1
- USN-6974-2
- USN-6976-1
- USN-6979-1
- USN-7003-1
- USN-7003-2
- USN-7003-3
- USN-7006-1
- USN-7007-1
- USN-7009-1
- VU:647177
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |