Details
-
Improvement
-
Resolution: Fixed
-
Minor
-
Lustre 2.16.0
-
None
-
3
-
9223372036854775807
Description
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
- CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices
(bsc#1225601, bsc#1225600). - CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52751: smb: client: fix use-after-free in
smb2_query_info_compound() (bsc#1225489). - CVE-2023-52775: net/smc: avoid data corruption caused by decline
(bsc#1225088). - CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection
dump (bsc#1220942). - CVE-2024-26623: pds_core: Prevent race issues involving the adminq
(bsc#1221057). - CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in
ip6_tnl_parse_tlv_enc_lim() (bsc#1221647). - CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding
changes (bsc#1221659). - CVE-2024-26641: ip6_tunnel: make sure to pull inner header in
__ip6_tnl_rcv() (bsc#1221654). - CVE-2024-26663: tipc: Check the bearer type before calling
tipc_udp_nl_bearer_add() (bsc#1222326). - CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU
error (bsc#1222328). - CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463).
- CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in
devlink_init() (bsc#1222438). - CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova
(bsc#1222779). - CVE-2024-26826: mptcp: fix data re-injection from stale subflow
(bsc#1223010). - CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node()
(bsc#1223021). - CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate()
(bsc#1223731). - CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set
fails (bsc#1223804). - CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
__nft_obj_type_get() (bsc#1223813) - CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
__nft_expr_type_get() (bsc#1223815) - CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in
nf_tables_updchain (bsc#1223740). - CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on
updates (bsc#1223836). - CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422)
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit
(bsc#1224743). - CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
(bsc#1224604). - CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before
exit_net release (bsc#1224499) - CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak
(bsc#1224490) - CVE-2024-35934: net/smc: reduce rtnl pressure in
smc_pnet_create_pnetids_list() (bsc#1224641) - CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to
hdmimix domain (bsc#1224589). - CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf()
(bsc#1224544). - CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1224545) - CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
fib6_rule_action() (bsc#1225719). - CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't
be re-encrypted (bsc#1225744). - CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl
(bsc#1225752). - CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted()
fails (bsc#1225753). - CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable
(bsc#1225757). - CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation
(bsc#1225851). - CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
(bsc#1226519). - CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for
ICMPv6 (bsc#1226783). - CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx
packets (bsc#1226750). - CVE-2024-38598: md: fix resync softlockup when bitmap size is less than
array size (bsc#1226757). - CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin
(bsc#1226866). - CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port
(bsc#1226883). - CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in
ext4_xattr_block_cache_find() (bsc#1226993). - CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon()
(bsc#1227103. - CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy
h_size fixup (bsc#1227432). - CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with
__GFP_NOFAIL (bsc#1227434). - CVE-2024-39482: bcache: fix variable length array abuse in btree_iter
(bsc#1227447). - CVE-2024-39487: bonding: Fix out-of-bounds read in
bond_option_arp_ip_targets_set() (bsc#1227573) - CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core
(bsc#1227626). - CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name
(bsc#1227716). - CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev
replace (bsc#1227719). - CVE-2024-39498: drm/mst: Fix NULL pointer dereference at
drm_dp_add_payload_part2 (bsc#1227723) - CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload
(bsc#1227757). - CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario
(bsc#1227730). - CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-
allocated memory (bsc#1227762). - CVE-2024-40906: net/mlx5: Always stop health timer during driver removal
(bsc#1227763). - CVE-2024-40908: bpf: Set run context for rawtp test_run callback
(bsc#1227783). - CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of
released token in __hwrm_send() (bsc#1227779). - CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure
(bsc#1227786). - CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789).
- CVE-2024-40928: net: ethtool: fix the error condition in
ethtool_get_phy_stats_ethtool() (bsc#1227788). - CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect
(bsc#1227780). - CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD
(bsc#1227797). - CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227836). - CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules
creation fail (bsc#1227800). - CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section
(bsc#1227803). - CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
kvm_vcpu_on_spin() (bsc#1227806). - CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe()
(bsc#1227813). - CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init()
(bsc#1227814). - CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc
(bsc#1227886). - CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into
ext4_xattr_inode_lookup_create() (bsc#1227910). - CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in
reverse order (bsc#1227926). - CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in
__ext4_fill_super() (bsc#1227866). - CVE-2024-40999: net: ena: Add validation for completion descriptors
consistency (bsc#1227913). - CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry()
(bsc#1227862). - CVE-2024-41013: xfs: do not walk off the end of a directory data block
(bsc#1228405). - CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
(bsc#1228408). - CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html