Beschreibung: | Summary: The remote host is missing an update for the 'the Linux Kernel' package(s) announced via the SUSE-SU-2024:2019-1 advisory.
Vulnerability Insight: The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657). - CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). - CVE-2024-35976: Validate user input for XDP_{UMEMCOMPLETION}_FILL_RING (bsc#1224575). - CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761). - CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488). - CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085). - CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549). - CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548). - CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506) - CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). - CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011). - CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550). - CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). - CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). - CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). - CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668). - CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). - CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). - CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). - CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667). - CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). - CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679). - CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672). - CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464). - CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). - CVE-2023-42755: Check user supplied offsets (bsc#1215702). - CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581). - CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621) - CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747). - CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097). - CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718). - CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531). - CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729). - CVE-2024-35799: Prevent crash when disable stream (bsc#1224740). - ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'the Linux Kernel' package(s) on openSUSE Leap 15.5.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|