Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP7:Update
patchinfo.36228
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.36228
<patchinfo incident="36228"> <issue id="1223363" tracker="bnc">VUL-0: CVE-2024-26828: kernel live patch: cifs: underflow in parse_server_interfaces()</issue> <issue id="1223683" tracker="bnc">VUL-0: CVE-2024-26923: kernel live patch: af_unix: fix garbage collector racing against connect()</issue> <issue id="1225011" tracker="bnc">VUL-0: CVE-2024-35863: kernel live patch: smb: client: fix potential UAF in is_valid_oplock_break()</issue> <issue id="1225012" tracker="bnc">VUL-0: CVE-2024-35867: kernel live patch: smb: client: fix potential UAF in cifs_stats_proc_show()</issue> <issue id="1225013" tracker="bnc">VUL-0: CVE-2024-27398: kernel live patch: Bluetooth: fix use-after-free bugs caused by sco_sock_timeout</issue> <issue id="1225099" tracker="bnc">VUL-0: CVE-2023-52846: kernel live patch: hsr: Prevent use after free in prp_create_tagged_frame()</issue> <issue id="1225309" tracker="bnc">VUL-0: CVE-2024-35864: kernel live patch: smb: client: fix potential UAF in smb2_is_valid_lease_break()</issue> <issue id="1225311" tracker="bnc">VUL-0: CVE-2024-35862: kernel live patch: smb: client: fix potential UAF in smb2_is_network_name_deleted()</issue> <issue id="1225312" tracker="bnc">VUL-0: CVE-2024-35861: kernel live patch: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()</issue> <issue id="1225739" tracker="bnc">VUL-0: CVE-2024-36899: kernel live patch: gpiolib: cdev: Fix use after free in lineinfo_changed_notify</issue> <issue id="1225819" tracker="bnc">VUL-0: CVE-2023-52752: kernel live patch: smb: client: fix use-after-free bug in cifs_debug_data_proc_show()</issue> <issue id="1226325" tracker="bnc">VUL-0: CVE-2024-36964: kernel live patch: fs/9p: only translate RWX permissions for plain 9P2000</issue> <issue id="1226327" tracker="bnc">VUL-0: CVE-2024-35905: kernel live patch: bpf: Protect against int overflow for stack access size</issue> <issue id="1227471" tracker="bnc">VUL-0: CVE-2021-47598: kernel live patch: sch_cake: do not call cake_destroy() from cake_init()</issue> <issue id="1228573" tracker="bnc">VUL-0: CVE-2024-41059: kernel live patch: hfsplus: fix uninit-value in copy_name</issue> <issue id="1228786" tracker="bnc">VUL-0: CVE-2024-40954: kernel live patch: net: do not leave a dangling sk pointer, when socket creation fails</issue> <issue id="2021-47598" tracker="cve" /> <issue id="2023-52752" tracker="cve" /> <issue id="2023-52846" tracker="cve" /> <issue id="2024-26828" tracker="cve" /> <issue id="2024-26923" tracker="cve" /> <issue id="2024-27398" tracker="cve" /> <issue id="2024-35861" tracker="cve" /> <issue id="2024-35862" tracker="cve" /> <issue id="2024-35863" tracker="cve" /> <issue id="2024-35864" tracker="cve" /> <issue id="2024-35867" tracker="cve" /> <issue id="2024-35905" tracker="cve" /> <issue id="2024-36899" tracker="cve" /> <issue id="2024-36964" tracker="cve" /> <issue id="2024-40954" tracker="cve" /> <issue id="2024-41059" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.14.21-150500_13_52 fixes several issues. The following security issues were fixed: - CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). - CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). - CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). - CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). - CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). - CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). - CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). - CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). - CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). - CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) - CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). - CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). - CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). - CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). - CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). - CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). </description> <summary>Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor