[SUSE-SU-2024:2895-1] Security update for the Linux Kernel
Severity
Important
CVEs
13
Security update for the Linux Kernel
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).
- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).
- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2024-38599: jffs2: prevent xattr node from overflowing the eraseblock (bsc#1226848).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
The following non-security bugs were fixed:
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- kvm: prevent kvm_clock time-warps (bsc#1197439).
- net: unix: properly re-increment inflight counter of GC discarded candidates (bsc#1223384).
- ID
- SUSE-SU-2024:2895-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20242895-1/
- Published
-
2024-08-13T14:08:42
(4 weeks ago) - Modified
-
2024-08-13T14:08:42
(4 weeks ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2024-1899
- ALAS2-2022-1749
- ALAS2-2024-2391
- ALAS2-2024-2581
- ALSA-2022:1988
- ALSA-2024:4211
- DSA-5096-1
- DSA-5680-1
- DSA-5681-1
- DSA-5730-1
- DSA-5747-1
- ELSA-2022-1988
- ELSA-2024-12581
- ELSA-2024-12584
- ELSA-2024-12585
- ELSA-2024-12606
- ELSA-2024-12610
- ELSA-2024-12611
- ELSA-2024-12612
- ELSA-2024-4211
- MS:CVE-2021-43389
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3806-1
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2024:4211
- RHSA-2024:4352
- RLSA-2022:1988
- RLSA-2024:4211
- SSA:2022-031-01
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2024:1641-1
- SUSE-SU-2024:1644-1
- SUSE-SU-2024:1647-1
- SUSE-SU-2024:1659-1
- SUSE-SU-2024:1663-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2011-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2203-1
- SUSE-SU-2024:2326-1
- SUSE-SU-2024:2335-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2338-1
- SUSE-SU-2024:2341-1
- SUSE-SU-2024:2342-1
- SUSE-SU-2024:2343-1
- SUSE-SU-2024:2344-1
- SUSE-SU-2024:2351-1
- SUSE-SU-2024:2357-1
- SUSE-SU-2024:2358-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2362-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2368-1
- SUSE-SU-2024:2369-1
- SUSE-SU-2024:2372-1
- SUSE-SU-2024:2373-1
- SUSE-SU-2024:2381-1
- SUSE-SU-2024:2382-1
- SUSE-SU-2024:2384-1
- SUSE-SU-2024:2385-1
- SUSE-SU-2024:2394-1
- SUSE-SU-2024:2396-1
- SUSE-SU-2024:2407-1
- SUSE-SU-2024:2410-1
- SUSE-SU-2024:2411-1
- SUSE-SU-2024:2437-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2447-1
- SUSE-SU-2024:2448-1
- SUSE-SU-2024:2449-1
- SUSE-SU-2024:2472-1
- SUSE-SU-2024:2473-1
- SUSE-SU-2024:2474-1
- SUSE-SU-2024:2480-1
- SUSE-SU-2024:2487-1
- SUSE-SU-2024:2488-1
- SUSE-SU-2024:2493-1
- SUSE-SU-2024:2495-1
- SUSE-SU-2024:2530-1
- SUSE-SU-2024:2549-1
- SUSE-SU-2024:2558-1
- SUSE-SU-2024:2559-1
- SUSE-SU-2024:2561-1
- SUSE-SU-2024:2571-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2723-1
- SUSE-SU-2024:2725-1
- SUSE-SU-2024:2726-1
- SUSE-SU-2024:2740-1
- SUSE-SU-2024:2751-1
- SUSE-SU-2024:2755-1
- SUSE-SU-2024:2758-1
- SUSE-SU-2024:2759-1
- SUSE-SU-2024:2773-1
- SUSE-SU-2024:2792-1
- SUSE-SU-2024:2797-1
- SUSE-SU-2024:2821-1
- SUSE-SU-2024:2822-1
- SUSE-SU-2024:2823-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2825-1
- SUSE-SU-2024:2840-1
- SUSE-SU-2024:2841-1
- SUSE-SU-2024:2843-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2851-1
- SUSE-SU-2024:2852-1
- SUSE-SU-2024:2853-1
- SUSE-SU-2024:2874-1
- SUSE-SU-2024:2892-1
- SUSE-SU-2024:2893-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2896-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2902-1
- SUSE-SU-2024:2923-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2939-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2947-1
- SUSE-SU-2024:2948-1
- SUSE-SU-2024:2973-1
- SUSE-SU-2024:3015-1
- SUSE-SU-2024:3034-1
- SUSE-SU-2024:3037-1
- SUSE-SU-2024:3039-1
- SUSE-SU-2024:3043-1
- SUSE-SU-2024:3044-1
- SUSE-SU-2024:3048-1
- SUSE-SU-2024:3194-1
- SUSE-SU-2024:3195-1
- USN-5139-1
- USN-5165-1
- USN-5208-1
- USN-5209-1
- USN-5210-1
- USN-5218-1
- USN-5343-1
- USN-6893-1
- USN-6893-2
- USN-6893-3
- USN-6895-1
- USN-6895-2
- USN-6895-3
- USN-6895-4
- USN-6896-1
- USN-6896-2
- USN-6896-3
- USN-6896-4
- USN-6896-5
- USN-6898-1
- USN-6898-2
- USN-6898-3
- USN-6898-4
- USN-6900-1
- USN-6917-1
- USN-6918-1
- USN-6919-1
- USN-6923-1
- USN-6923-2
- USN-6926-1
- USN-6926-2
- USN-6926-3
- USN-6927-1
- USN-6938-1
- USN-6949-1
- USN-6949-2
- USN-6950-1
- USN-6950-2
- USN-6950-3
- USN-6950-4
- USN-6951-1
- USN-6951-2
- USN-6951-3
- USN-6951-4
- USN-6952-1
- USN-6952-2
- USN-6953-1
- USN-6955-1
- USN-6956-1
- USN-6957-1
- USN-6979-1
- USN-7003-1
- USN-7003-2
- USN-7003-3
- USN-7006-1
- USN-7007-1
- USN-7009-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |