suse-su-2025:0230-1
Vulnerability from csaf_suse
Published
2025-01-24 10:10
Modified
2025-01-24 10:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49035: media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (bsc#1215304).
- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).
- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).
- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).
- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
The following non-security bugs were fixed:
- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
Patchnames
SUSE-2025-230,SUSE-SUSE-MicroOS-5.1-2025-230,SUSE-SUSE-MicroOS-5.2-2025-230
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-49035: media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (bsc#1215304).\n- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).\n- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).\n- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).\n- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).\n- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).\n- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).\n- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).\n- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).\n- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).\n- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).\n- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).\n\nThe following non-security bugs were fixed:\n\n- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-230,SUSE-SUSE-MicroOS-5.1-2025-230,SUSE-SUSE-MicroOS-5.2-2025-230", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0230-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0230-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250230-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0230-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" }, { "category": "self", "summary": "SUSE Bug 1215304", "url": "https://bugzilla.suse.com/1215304" }, { "category": "self", "summary": "SUSE Bug 1220927", "url": "https://bugzilla.suse.com/1220927" }, { "category": "self", "summary": "SUSE Bug 1220937", "url": "https://bugzilla.suse.com/1220937" }, { "category": "self", "summary": "SUSE Bug 1230697", "url": "https://bugzilla.suse.com/1230697" }, { "category": "self", "summary": "SUSE Bug 1232436", "url": "https://bugzilla.suse.com/1232436" }, { "category": "self", "summary": "SUSE Bug 1234281", "url": "https://bugzilla.suse.com/1234281" }, { "category": "self", "summary": "SUSE Bug 1234690", "url": "https://bugzilla.suse.com/1234690" }, { "category": "self", "summary": "SUSE Bug 1234846", "url": "https://bugzilla.suse.com/1234846" }, { "category": "self", "summary": "SUSE Bug 1234853", "url": "https://bugzilla.suse.com/1234853" }, { "category": "self", "summary": "SUSE Bug 1234891", "url": "https://bugzilla.suse.com/1234891" }, { "category": "self", "summary": "SUSE Bug 1234921", "url": "https://bugzilla.suse.com/1234921" }, { "category": "self", "summary": "SUSE Bug 1234963", "url": "https://bugzilla.suse.com/1234963" }, { "category": "self", "summary": "SUSE Bug 1235004", "url": "https://bugzilla.suse.com/1235004" }, { "category": "self", "summary": "SUSE Bug 1235054", "url": "https://bugzilla.suse.com/1235054" }, { "category": "self", "summary": "SUSE Bug 1235056", "url": "https://bugzilla.suse.com/1235056" }, { "category": "self", "summary": "SUSE Bug 1235061", "url": "https://bugzilla.suse.com/1235061" }, { "category": "self", "summary": "SUSE Bug 1235073", "url": "https://bugzilla.suse.com/1235073" }, { "category": "self", "summary": "SUSE Bug 1235246", "url": "https://bugzilla.suse.com/1235246" }, { "category": "self", "summary": "SUSE Bug 1235480", "url": "https://bugzilla.suse.com/1235480" }, { "category": "self", "summary": "SUSE Bug 1235584", "url": "https://bugzilla.suse.com/1235584" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49035 page", "url": "https://www.suse.com/security/cve/CVE-2022-49035/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52524 page", "url": "https://www.suse.com/security/cve/CVE-2023-52524/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53142 page", "url": "https://www.suse.com/security/cve/CVE-2024-53142/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53144 page", "url": "https://www.suse.com/security/cve/CVE-2024-53144/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53146 page", "url": "https://www.suse.com/security/cve/CVE-2024-53146/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53156 page", "url": "https://www.suse.com/security/cve/CVE-2024-53156/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53173 page", "url": "https://www.suse.com/security/cve/CVE-2024-53173/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53179 page", "url": "https://www.suse.com/security/cve/CVE-2024-53179/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53214 page", "url": "https://www.suse.com/security/cve/CVE-2024-53214/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53239 page", "url": "https://www.suse.com/security/cve/CVE-2024-53239/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53240 page", "url": "https://www.suse.com/security/cve/CVE-2024-53240/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56539 page", "url": "https://www.suse.com/security/cve/CVE-2024-56539/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56548 page", "url": "https://www.suse.com/security/cve/CVE-2024-56548/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56604 page", "url": "https://www.suse.com/security/cve/CVE-2024-56604/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56605 page", "url": "https://www.suse.com/security/cve/CVE-2024-56605/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56631 page", "url": "https://www.suse.com/security/cve/CVE-2024-56631/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56704 page", "url": "https://www.suse.com/security/cve/CVE-2024-56704/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-8805 page", "url": "https://www.suse.com/security/cve/CVE-2024-8805/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2025-01-24T10:10:41Z", "generator": { "date": "2025-01-24T10:10:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0230-1", "initial_release_date": "2025-01-24T10:10:41Z", "revision_history": [ { "date": "2025-01-24T10:10:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150300.197.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150300.197.1.noarch", "product_id": "kernel-devel-rt-5.3.18-150300.197.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150300.197.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-150300.197.1.noarch", "product_id": "kernel-source-rt-5.3.18-150300.197.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150300.197.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150300.197.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150300.197.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150300.197.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150300.197.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150300.197.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt-optional-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt-optional-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-optional-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-rt_debug-optional-5.3.18-150300.197.1.x86_64", "product_id": "kernel-rt_debug-optional-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150300.197.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150300.197.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150300.197.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150300.197.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150300.197.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150300.197.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150300.197.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150300.197.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150300.197.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150300.197.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.197.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.197.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.197.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150300.197.1.noarch as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150300.197.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.197.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.197.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150300.197.1.noarch as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150300.197.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-49035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49035" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE\n\nI expect that the hardware will have limited this to 16, but just in\ncase it hasn\u0027t, check for this corner case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49035", "url": "https://www.suse.com/security/cve/CVE-2022-49035" }, { "category": "external", "summary": "SUSE Bug 1215304 for CVE-2022-49035", "url": "https://bugzilla.suse.com/1215304" }, { "category": "external", "summary": "SUSE Bug 1235013 for CVE-2022-49035", "url": "https://bugzilla.suse.com/1235013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2022-49035" }, { "cve": "CVE-2023-52524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52524" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: llcp: Add lock when modifying device list\n\nThe device list needs its associated lock held when modifying it, or the\nlist could become corrupted, as syzbot discovered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52524", "url": "https://www.suse.com/security/cve/CVE-2023-52524" }, { "category": "external", "summary": "SUSE Bug 1220927 for CVE-2023-52524", "url": "https://bugzilla.suse.com/1220927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "moderate" } ], "title": "CVE-2023-52524" }, { "cve": "CVE-2024-53142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53142" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninitramfs: avoid filename buffer overrun\n\nThe initramfs filename field is defined in\nDocumentation/driver-api/early-userspace/buffer-format.rst as:\n\n 37 cpio_file := ALGN(4) + cpio_header + filename + \"\\0\" + ALGN(4) + data\n...\n 55 ============= ================== =========================\n 56 Field name Field size Meaning\n 57 ============= ================== =========================\n...\n 70 c_namesize 8 bytes Length of filename, including final \\0\n\nWhen extracting an initramfs cpio archive, the kernel\u0027s do_name() path\nhandler assumes a zero-terminated path at @collected, passing it\ndirectly to filp_open() / init_mkdir() / init_mknod().\n\nIf a specially crafted cpio entry carries a non-zero-terminated filename\nand is followed by uninitialized memory, then a file may be created with\ntrailing characters that represent the uninitialized memory. The ability\nto create an initramfs entry would imply already having full control of\nthe system, so the buffer overrun shouldn\u0027t be considered a security\nvulnerability.\n\nAppend the output of the following bash script to an existing initramfs\nand observe any created /initramfs_test_fname_overrunAA* path. E.g.\n ./reproducer.sh | gzip \u003e\u003e /myinitramfs\n\nIt\u0027s easiest to observe non-zero uninitialized memory when the output is\ngzipped, as it\u0027ll overflow the heap allocated @out_buf in __gunzip(),\nrather than the initrd_start+initrd_size block.\n\n---- reproducer.sh ----\nnilchar=\"A\"\t# change to \"\\0\" to properly zero terminate / pad\nmagic=\"070701\"\nino=1\nmode=$(( 0100777 ))\nuid=0\ngid=0\nnlink=1\nmtime=1\nfilesize=0\ndevmajor=0\ndevminor=1\nrdevmajor=0\nrdevminor=0\ncsum=0\nfname=\"initramfs_test_fname_overrun\"\nnamelen=$(( ${#fname} + 1 ))\t# plus one to account for terminator\n\nprintf \"%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s\" \\\n\t$magic $ino $mode $uid $gid $nlink $mtime $filesize \\\n\t$devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname\n\ntermpadlen=$(( 1 + ((4 - ((110 + $namelen) \u0026 3)) % 4) ))\nprintf \"%.s${nilchar}\" $(seq 1 $termpadlen)\n---- reproducer.sh ----\n\nSymlink filename fields handled in do_symlink() won\u0027t overrun past the\ndata segment, due to the explicit zero-termination of the symlink\ntarget.\n\nFix filename buffer overrun by aborting the initramfs FSM if any cpio\nentry doesn\u0027t carry a zero-terminator at the expected (name_len - 1)\noffset.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53142", "url": "https://www.suse.com/security/cve/CVE-2024-53142" }, { "category": "external", "summary": "SUSE Bug 1232436 for CVE-2024-53142", "url": "https://bugzilla.suse.com/1232436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "moderate" } ], "title": "CVE-2024-53142" }, { "cve": "CVE-2024-53144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53144" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE\n\nThis aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4\n(\"Bluetooth: Always request for user confirmation for Just Works\")\nalways request user confirmation with confirm_hint set since the\nlikes of bluetoothd have dedicated policy around JUST_WORKS method\n(e.g. main.conf:JustWorksRepairing).\n\nCVE: CVE-2024-8805", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53144", "url": "https://www.suse.com/security/cve/CVE-2024-53144" }, { "category": "external", "summary": "SUSE Bug 1234690 for CVE-2024-53144", "url": "https://bugzilla.suse.com/1234690" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "moderate" } ], "title": "CVE-2024-53144" }, { "cve": "CVE-2024-53146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53146" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53146", "url": "https://www.suse.com/security/cve/CVE-2024-53146" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-53146", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1234854 for CVE-2024-53146", "url": "https://bugzilla.suse.com/1234854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-53146" }, { "cve": "CVE-2024-53156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53156" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()\n\nI found the following bug in my fuzzer:\n\n UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51\n index 255 is out of range for type \u0027htc_endpoint [22]\u0027\n CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: events request_firmware_work_func\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x180/0x1b0\n __ubsan_handle_out_of_bounds+0xd4/0x130\n htc_issue_send.constprop.0+0x20c/0x230\n ? _raw_spin_unlock_irqrestore+0x3c/0x70\n ath9k_wmi_cmd+0x41d/0x610\n ? mark_held_locks+0x9f/0xe0\n ...\n\nSince this bug has been confirmed to be caused by insufficient verification\nof conn_rsp_epid, I think it would be appropriate to add a range check for\nconn_rsp_epid to htc_connect_service() to prevent the bug from occurring.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53156", "url": "https://www.suse.com/security/cve/CVE-2024-53156" }, { "category": "external", "summary": "SUSE Bug 1234846 for CVE-2024-53156", "url": "https://bugzilla.suse.com/1234846" }, { "category": "external", "summary": "SUSE Bug 1234847 for CVE-2024-53156", "url": "https://bugzilla.suse.com/1234847" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-53156", "url": "https://bugzilla.suse.com/1234853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-53156" }, { "cve": "CVE-2024-53173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53173" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53173", "url": "https://www.suse.com/security/cve/CVE-2024-53173" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-53173", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1234891 for CVE-2024-53173", "url": "https://bugzilla.suse.com/1234891" }, { "category": "external", "summary": "SUSE Bug 1234892 for CVE-2024-53173", "url": "https://bugzilla.suse.com/1234892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-53173" }, { "cve": "CVE-2024-53179", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53179" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free of signing key\n\nCustomers have reported use-after-free in @ses-\u003eauth_key.response with\nSMB2.1 + sign mounts which occurs due to following race:\n\ntask A task B\ncifs_mount()\n dfs_mount_share()\n get_session()\n cifs_mount_get_session() cifs_send_recv()\n cifs_get_smb_ses() compound_send_recv()\n cifs_setup_session() smb2_setup_request()\n kfree_sensitive() smb2_calc_signature()\n crypto_shash_setkey() *UAF*\n\nFix this by ensuring that we have a valid @ses-\u003eauth_key.response by\nchecking whether @ses-\u003eses_status is SES_GOOD or SES_EXITING with\n@ses-\u003eses_lock held. After commit 24a9799aa8ef (\"smb: client: fix UAF\nin smb2_reconnect_server()\"), we made sure to call -\u003elogoff() only\nwhen @ses was known to be good (e.g. valid -\u003eauth_key.response), so\nit\u0027s safe to access signing key when @ses-\u003eses_status == SES_EXITING.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53179", "url": "https://www.suse.com/security/cve/CVE-2024-53179" }, { "category": "external", "summary": "SUSE Bug 1234921 for CVE-2024-53179", "url": "https://bugzilla.suse.com/1234921" }, { "category": "external", "summary": "SUSE Bug 1234927 for CVE-2024-53179", "url": "https://bugzilla.suse.com/1234927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-53179" }, { "cve": "CVE-2024-53214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53214" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53214", "url": "https://www.suse.com/security/cve/CVE-2024-53214" }, { "category": "external", "summary": "SUSE Bug 1235004 for CVE-2024-53214", "url": "https://bugzilla.suse.com/1235004" }, { "category": "external", "summary": "SUSE Bug 1235005 for CVE-2024-53214", "url": "https://bugzilla.suse.com/1235005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-53214" }, { "cve": "CVE-2024-53239", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53239" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: 6fire: Release resources at card release\n\nThe current 6fire code tries to release the resources right after the\ncall of usb6fire_chip_abort(). But at this moment, the card object\nmight be still in use (as we\u0027re calling snd_card_free_when_closed()).\n\nFor avoid potential UAFs, move the release of resources to the card\u0027s\nprivate_free instead of the manual call of usb6fire_chip_destroy() at\nthe USB disconnect callback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53239", "url": "https://www.suse.com/security/cve/CVE-2024-53239" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-53239", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1235054 for CVE-2024-53239", "url": "https://bugzilla.suse.com/1235054" }, { "category": "external", "summary": "SUSE Bug 1235055 for CVE-2024-53239", "url": "https://bugzilla.suse.com/1235055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-53239" }, { "cve": "CVE-2024-53240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53240" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/netfront: fix crash when removing device\n\nWhen removing a netfront device directly after a suspend/resume cycle\nit might happen that the queues have not been setup again, causing a\ncrash during the attempt to stop the queues another time.\n\nFix that by checking the queues are existing before trying to stop\nthem.\n\nThis is XSA-465 / CVE-2024-53240.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53240", "url": "https://www.suse.com/security/cve/CVE-2024-53240" }, { "category": "external", "summary": "SUSE Bug 1234281 for CVE-2024-53240", "url": "https://bugzilla.suse.com/1234281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "moderate" } ], "title": "CVE-2024-53240" }, { "cve": "CVE-2024-56539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56539" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()\n\nReplace one-element array with a flexible-array member in `struct\nmwifiex_ie_types_wildcard_ssid_params` to fix the following warning\non a MT8173 Chromebook (mt8173-elm-hana):\n\n[ 356.775250] ------------[ cut here ]------------\n[ 356.784543] memcpy: detected field-spanning write (size 6) of single field \"wildcard_ssid_tlv-\u003essid\" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)\n[ 356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]\n\nThe \"(size 6)\" above is exactly the length of the SSID of the network\nthis device was connected to. The source of the warning looks like:\n\n ssid_len = user_scan_in-\u003essid_list[i].ssid_len;\n [...]\n memcpy(wildcard_ssid_tlv-\u003essid,\n user_scan_in-\u003essid_list[i].ssid, ssid_len);\n\nThere is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this\nstruct, but it already didn\u0027t account for the size of the one-element\narray, so it doesn\u0027t need to be changed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56539", "url": "https://www.suse.com/security/cve/CVE-2024-56539" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-56539", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1234963 for CVE-2024-56539", "url": "https://bugzilla.suse.com/1234963" }, { "category": "external", "summary": "SUSE Bug 1234964 for CVE-2024-56539", "url": "https://bugzilla.suse.com/1234964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-56539" }, { "cve": "CVE-2024-56548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56548" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: don\u0027t query the device logical block size multiple times\n\nDevices block sizes may change. One of these cases is a loop device by\nusing ioctl LOOP_SET_BLOCK_SIZE.\n\nWhile this may cause other issues like IO being rejected, in the case of\nhfsplus, it will allocate a block by using that size and potentially write\nout-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the\nlatter function reads a different io_size.\n\nUsing a new min_io_size initally set to sb_min_blocksize works for the\npurposes of the original fix, since it will be set to the max between\nHFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the\nmax between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not\ninitialized.\n\nTested by mounting an hfsplus filesystem with loop block sizes 512, 1024\nand 4096.\n\nThe produced KASAN report before the fix looks like this:\n\n[ 419.944641] ==================================================================\n[ 419.945655] BUG: KASAN: slab-use-after-free in hfsplus_read_wrapper+0x659/0xa0a\n[ 419.946703] Read of size 2 at addr ffff88800721fc00 by task repro/10678\n[ 419.947612]\n[ 419.947846] CPU: 0 UID: 0 PID: 10678 Comm: repro Not tainted 6.12.0-rc5-00008-gdf56e0f2f3ca #84\n[ 419.949007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[ 419.950035] Call Trace:\n[ 419.950384] \u003cTASK\u003e\n[ 419.950676] dump_stack_lvl+0x57/0x78\n[ 419.951212] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.951830] print_report+0x14c/0x49e\n[ 419.952361] ? __virt_addr_valid+0x267/0x278\n[ 419.952979] ? kmem_cache_debug_flags+0xc/0x1d\n[ 419.953561] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.954231] kasan_report+0x89/0xb0\n[ 419.954748] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.955367] hfsplus_read_wrapper+0x659/0xa0a\n[ 419.955948] ? __pfx_hfsplus_read_wrapper+0x10/0x10\n[ 419.956618] ? do_raw_spin_unlock+0x59/0x1a9\n[ 419.957214] ? _raw_spin_unlock+0x1a/0x2e\n[ 419.957772] hfsplus_fill_super+0x348/0x1590\n[ 419.958355] ? hlock_class+0x4c/0x109\n[ 419.958867] ? __pfx_hfsplus_fill_super+0x10/0x10\n[ 419.959499] ? __pfx_string+0x10/0x10\n[ 419.960006] ? lock_acquire+0x3e2/0x454\n[ 419.960532] ? bdev_name.constprop.0+0xce/0x243\n[ 419.961129] ? __pfx_bdev_name.constprop.0+0x10/0x10\n[ 419.961799] ? pointer+0x3f0/0x62f\n[ 419.962277] ? __pfx_pointer+0x10/0x10\n[ 419.962761] ? vsnprintf+0x6c4/0xfba\n[ 419.963178] ? __pfx_vsnprintf+0x10/0x10\n[ 419.963621] ? setup_bdev_super+0x376/0x3b3\n[ 419.964029] ? snprintf+0x9d/0xd2\n[ 419.964344] ? __pfx_snprintf+0x10/0x10\n[ 419.964675] ? lock_acquired+0x45c/0x5e9\n[ 419.965016] ? set_blocksize+0x139/0x1c1\n[ 419.965381] ? sb_set_blocksize+0x6d/0xae\n[ 419.965742] ? __pfx_hfsplus_fill_super+0x10/0x10\n[ 419.966179] mount_bdev+0x12f/0x1bf\n[ 419.966512] ? __pfx_mount_bdev+0x10/0x10\n[ 419.966886] ? vfs_parse_fs_string+0xce/0x111\n[ 419.967293] ? __pfx_vfs_parse_fs_string+0x10/0x10\n[ 419.967702] ? __pfx_hfsplus_mount+0x10/0x10\n[ 419.968073] legacy_get_tree+0x104/0x178\n[ 419.968414] vfs_get_tree+0x86/0x296\n[ 419.968751] path_mount+0xba3/0xd0b\n[ 419.969157] ? __pfx_path_mount+0x10/0x10\n[ 419.969594] ? kmem_cache_free+0x1e2/0x260\n[ 419.970311] do_mount+0x99/0xe0\n[ 419.970630] ? __pfx_do_mount+0x10/0x10\n[ 419.971008] __do_sys_mount+0x199/0x1c9\n[ 419.971397] do_syscall_64+0xd0/0x135\n[ 419.971761] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 419.972233] RIP: 0033:0x7c3cb812972e\n[ 419.972564] Code: 48 8b 0d f5 46 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d c2 46 0d 00 f7 d8 64 89 01 48\n[ 419.974371] RSP: 002b:00007ffe30632548 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5\n[ 419.975048] RAX: ffffffffffffffda RBX: 00007ffe306328d8 RCX: 00007c3cb812972e\n[ 419.975701] RDX: 0000000020000000 RSI: 0000000020000c80 RDI:\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56548", "url": "https://www.suse.com/security/cve/CVE-2024-56548" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-56548", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1235073 for CVE-2024-56548", "url": "https://bugzilla.suse.com/1235073" }, { "category": "external", "summary": "SUSE Bug 1235074 for CVE-2024-56548", "url": "https://bugzilla.suse.com/1235074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-56548" }, { "cve": "CVE-2024-56604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56604" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()\n\nbt_sock_alloc() attaches allocated sk object to the provided sock object.\nIf rfcomm_dlc_alloc() fails, we release the sk object, but leave the\ndangling pointer in the sock object, which may cause use-after-free.\n\nFix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56604", "url": "https://www.suse.com/security/cve/CVE-2024-56604" }, { "category": "external", "summary": "SUSE Bug 1235056 for CVE-2024-56604", "url": "https://bugzilla.suse.com/1235056" }, { "category": "external", "summary": "SUSE Bug 1235058 for CVE-2024-56604", "url": "https://bugzilla.suse.com/1235058" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-56604" }, { "cve": "CVE-2024-56605", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56605" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()\n\nbt_sock_alloc() allocates the sk object and attaches it to the provided\nsock object. On error l2cap_sock_alloc() frees the sk object, but the\ndangling pointer is still attached to the sock object, which may create\nuse-after-free in other code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56605", "url": "https://www.suse.com/security/cve/CVE-2024-56605" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-56605", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1235061 for CVE-2024-56605", "url": "https://bugzilla.suse.com/1235061" }, { "category": "external", "summary": "SUSE Bug 1235062 for CVE-2024-56605", "url": "https://bugzilla.suse.com/1235062" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-56605" }, { "cve": "CVE-2024-56631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56631" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Fix slab-use-after-free read in sg_release()\n\nFix a use-after-free bug in sg_release(), detected by syzbot with KASAN:\n\nBUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30\nkernel/locking/lockdep.c:5838\n__mutex_unlock_slowpath+0xe2/0x750 kernel/locking/mutex.c:912\nsg_release+0x1f4/0x2e0 drivers/scsi/sg.c:407\n\nIn sg_release(), the function kref_put(\u0026sfp-\u003ef_ref, sg_remove_sfp) is\ncalled before releasing the open_rel_lock mutex. The kref_put() call may\ndecrement the reference count of sfp to zero, triggering its cleanup\nthrough sg_remove_sfp(). This cleanup includes scheduling deferred work\nvia sg_remove_sfp_usercontext(), which ultimately frees sfp.\n\nAfter kref_put(), sg_release() continues to unlock open_rel_lock and may\nreference sfp or sdp. If sfp has already been freed, this results in a\nslab-use-after-free error.\n\nMove the kref_put(\u0026sfp-\u003ef_ref, sg_remove_sfp) call after unlocking the\nopen_rel_lock mutex. This ensures:\n\n - No references to sfp or sdp occur after the reference count is\n decremented.\n\n - Cleanup functions such as sg_remove_sfp() and\n sg_remove_sfp_usercontext() can safely execute without impacting the\n mutex handling in sg_release().\n\nThe fix has been tested and validated by syzbot. This patch closes the\nbug reported at the following syzkaller link and ensures proper\nsequencing of resource cleanup and mutex operations, eliminating the\nrisk of use-after-free errors in sg_release().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56631", "url": "https://www.suse.com/security/cve/CVE-2024-56631" }, { "category": "external", "summary": "SUSE Bug 1235480 for CVE-2024-56631", "url": "https://bugzilla.suse.com/1235480" }, { "category": "external", "summary": "SUSE Bug 1235482 for CVE-2024-56631", "url": "https://bugzilla.suse.com/1235482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-56631" }, { "cve": "CVE-2024-56704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56704" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\n9p/xen: fix release of IRQ\n\nKernel logs indicate an IRQ was double-freed.\n\nPass correct device ID during IRQ release.\n\n[Dominique: remove confusing variable reset to 0]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56704", "url": "https://www.suse.com/security/cve/CVE-2024-56704" }, { "category": "external", "summary": "SUSE Bug 1235584 for CVE-2024-56704", "url": "https://bugzilla.suse.com/1235584" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "moderate" } ], "title": "CVE-2024-56704" }, { "cve": "CVE-2024-8805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-8805" } ], "notes": [ { "category": "general", "text": "BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-8805", "url": "https://www.suse.com/security/cve/CVE-2024-8805" }, { "category": "external", "summary": "SUSE Bug 1230697 for CVE-2024-8805", "url": "https://bugzilla.suse.com/1230697" }, { "category": "external", "summary": "SUSE Bug 1240804 for CVE-2024-8805", "url": "https://bugzilla.suse.com/1240804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.197.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.197.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.197.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:41Z", "details": "important" } ], "title": "CVE-2024-8805" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…