suse-su-2025:0231-1
Vulnerability from csaf_suse
Published
2025-01-24 10:10
Modified
2025-01-24 10:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).
- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).
- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).
- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).
- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).
- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).
- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).
- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).
- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).
- CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1230697).
The following non-security bugs were fixed:
- KVM: x86: fix sending PV IPI (git-fixes).
- idpf: add support for SW triggered interrupts (bsc#1235507).
- idpf: enable WB_ON_ITR (bsc#1235507).
- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
- kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge.
- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).
- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression
- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).
- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642].
- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).
- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
Patchnames
SUSE-2025-231,SUSE-SLE-Micro-5.3-2025-231,SUSE-SLE-Micro-5.4-2025-231
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).\n- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).\n- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).\n- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).\n- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).\n- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).\n- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).\n- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).\n- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).\n- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).\n- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).\n- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).\n- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).\n- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).\n- CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1230697).\n\nThe following non-security bugs were fixed:\n\n- KVM: x86: fix sending PV IPI (git-fixes).\n- idpf: add support for SW triggered interrupts (bsc#1235507).\n- idpf: enable WB_ON_ITR (bsc#1235507).\n- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).\n- kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge.\n- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).\n- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).\n- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression\n- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).\n- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642].\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).\n- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).\n- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).\n- x86/fpu: Remove unused supervisor only offsets (git-fixes).\n- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).\n- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).\n- x86/mce: Allow instrumentation during task work queueing (git-fixes).\n- x86/mce: Mark mce_end() noinstr (git-fixes).\n- x86/mce: Mark mce_panic() noinstr (git-fixes).\n- x86/mce: Mark mce_read_aux() noinstr (git-fixes).\n- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).\n- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).\n- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).\n- x86/uaccess: Move variable into switch case statement (git-fixes).\n- x86: Annotate call_on_stack() (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-231,SUSE-SLE-Micro-5.3-2025-231,SUSE-SLE-Micro-5.4-2025-231", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0231-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0231-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250231-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0231-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1185010", "url": "https://bugzilla.suse.com/1185010" }, { "category": "self", "summary": "SUSE Bug 1189998", "url": "https://bugzilla.suse.com/1189998" }, { "category": "self", "summary": "SUSE Bug 1190358", "url": "https://bugzilla.suse.com/1190358" }, { "category": "self", "summary": "SUSE Bug 1190428", "url": "https://bugzilla.suse.com/1190428" }, { "category": "self", "summary": "SUSE Bug 1191949", "url": "https://bugzilla.suse.com/1191949" }, { "category": "self", "summary": "SUSE Bug 1193983", "url": "https://bugzilla.suse.com/1193983" }, { "category": "self", "summary": "SUSE Bug 1196869", "url": "https://bugzilla.suse.com/1196869" }, { "category": "self", "summary": "SUSE Bug 1200313", "url": "https://bugzilla.suse.com/1200313" }, { "category": "self", "summary": "SUSE Bug 1201308", "url": "https://bugzilla.suse.com/1201308" }, { "category": "self", "summary": "SUSE Bug 1201489", "url": "https://bugzilla.suse.com/1201489" }, { "category": "self", "summary": "SUSE Bug 1209657", "url": "https://bugzilla.suse.com/1209657" }, { "category": "self", "summary": "SUSE Bug 1209798", "url": "https://bugzilla.suse.com/1209798" }, { "category": "self", "summary": "SUSE Bug 1211592", "url": "https://bugzilla.suse.com/1211592" }, { "category": "self", "summary": "SUSE Bug 1215304", "url": "https://bugzilla.suse.com/1215304" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217169", "url": "https://bugzilla.suse.com/1217169" }, { "category": "self", "summary": "SUSE Bug 1218447", "url": "https://bugzilla.suse.com/1218447" }, { "category": "self", "summary": "SUSE Bug 1221044", "url": "https://bugzilla.suse.com/1221044" }, { "category": "self", "summary": "SUSE Bug 1222721", "url": "https://bugzilla.suse.com/1222721" }, { "category": "self", "summary": "SUSE Bug 1222878", "url": "https://bugzilla.suse.com/1222878" }, { "category": "self", "summary": "SUSE Bug 1223481", "url": "https://bugzilla.suse.com/1223481" }, { "category": "self", "summary": "SUSE Bug 1223501", "url": "https://bugzilla.suse.com/1223501" }, { "category": "self", "summary": "SUSE Bug 1223512", "url": "https://bugzilla.suse.com/1223512" }, { "category": "self", "summary": "SUSE Bug 1223520", "url": "https://bugzilla.suse.com/1223520" }, { "category": "self", "summary": "SUSE Bug 1223894", "url": "https://bugzilla.suse.com/1223894" }, { "category": "self", "summary": "SUSE Bug 1223921", "url": "https://bugzilla.suse.com/1223921" }, { "category": "self", "summary": "SUSE Bug 1223922", "url": "https://bugzilla.suse.com/1223922" }, { "category": "self", "summary": "SUSE Bug 1223923", "url": "https://bugzilla.suse.com/1223923" }, { "category": "self", "summary": "SUSE Bug 1223924", "url": "https://bugzilla.suse.com/1223924" }, { "category": "self", "summary": "SUSE Bug 1223929", "url": "https://bugzilla.suse.com/1223929" }, { "category": "self", "summary": "SUSE Bug 1223931", "url": "https://bugzilla.suse.com/1223931" }, { "category": "self", "summary": "SUSE Bug 1223932", "url": "https://bugzilla.suse.com/1223932" }, { "category": "self", "summary": "SUSE Bug 1223934", "url": "https://bugzilla.suse.com/1223934" }, { "category": "self", "summary": "SUSE Bug 1223941", "url": "https://bugzilla.suse.com/1223941" }, { "category": "self", "summary": "SUSE Bug 1223948", "url": "https://bugzilla.suse.com/1223948" }, { "category": "self", "summary": "SUSE Bug 1223952", "url": "https://bugzilla.suse.com/1223952" }, { "category": "self", "summary": "SUSE Bug 1223953", "url": "https://bugzilla.suse.com/1223953" }, { "category": "self", "summary": "SUSE Bug 1223957", "url": "https://bugzilla.suse.com/1223957" }, { "category": "self", "summary": "SUSE Bug 1223962", "url": "https://bugzilla.suse.com/1223962" }, { "category": "self", "summary": "SUSE Bug 1223963", "url": "https://bugzilla.suse.com/1223963" }, { "category": "self", "summary": "SUSE Bug 1223964", "url": "https://bugzilla.suse.com/1223964" }, { "category": "self", "summary": "SUSE Bug 1223996", "url": "https://bugzilla.suse.com/1223996" }, { "category": "self", "summary": "SUSE Bug 1224099", "url": "https://bugzilla.suse.com/1224099" }, { "category": "self", "summary": "SUSE Bug 1224482", "url": "https://bugzilla.suse.com/1224482" }, { "category": "self", "summary": "SUSE Bug 1224511", "url": "https://bugzilla.suse.com/1224511" }, { "category": "self", "summary": "SUSE Bug 1224592", "url": "https://bugzilla.suse.com/1224592" }, { "category": "self", "summary": "SUSE Bug 1224685", "url": "https://bugzilla.suse.com/1224685" }, { "category": "self", "summary": "SUSE Bug 1224730", "url": "https://bugzilla.suse.com/1224730" }, { "category": "self", "summary": "SUSE Bug 1224816", "url": "https://bugzilla.suse.com/1224816" }, { "category": "self", "summary": "SUSE Bug 1224895", "url": "https://bugzilla.suse.com/1224895" }, { "category": "self", "summary": "SUSE Bug 1224898", "url": "https://bugzilla.suse.com/1224898" }, { "category": "self", "summary": "SUSE Bug 1224900", "url": "https://bugzilla.suse.com/1224900" }, { "category": "self", "summary": "SUSE Bug 1224901", "url": "https://bugzilla.suse.com/1224901" }, { "category": "self", "summary": "SUSE Bug 1230697", "url": "https://bugzilla.suse.com/1230697" }, { "category": "self", "summary": "SUSE Bug 1232436", "url": "https://bugzilla.suse.com/1232436" }, { "category": "self", "summary": "SUSE Bug 1233070", "url": "https://bugzilla.suse.com/1233070" }, { "category": "self", "summary": "SUSE Bug 1233642", "url": "https://bugzilla.suse.com/1233642" }, { "category": "self", "summary": "SUSE Bug 1234281", "url": "https://bugzilla.suse.com/1234281" }, { "category": "self", "summary": "SUSE Bug 1234282", "url": "https://bugzilla.suse.com/1234282" }, { "category": "self", "summary": "SUSE Bug 1234846", "url": "https://bugzilla.suse.com/1234846" }, { "category": "self", "summary": "SUSE Bug 1234853", "url": "https://bugzilla.suse.com/1234853" }, { "category": "self", "summary": "SUSE Bug 1234891", "url": "https://bugzilla.suse.com/1234891" }, { "category": "self", "summary": "SUSE Bug 1234921", "url": "https://bugzilla.suse.com/1234921" }, { "category": "self", "summary": "SUSE Bug 1234960", "url": "https://bugzilla.suse.com/1234960" }, { "category": "self", "summary": "SUSE Bug 1234963", "url": "https://bugzilla.suse.com/1234963" }, { "category": "self", "summary": "SUSE Bug 1235004", "url": "https://bugzilla.suse.com/1235004" }, { "category": "self", "summary": "SUSE Bug 1235035", "url": "https://bugzilla.suse.com/1235035" }, { "category": "self", "summary": "SUSE Bug 1235054", "url": "https://bugzilla.suse.com/1235054" }, { "category": "self", "summary": "SUSE Bug 1235056", "url": "https://bugzilla.suse.com/1235056" }, { "category": "self", "summary": "SUSE Bug 1235061", "url": "https://bugzilla.suse.com/1235061" }, { "category": "self", "summary": "SUSE Bug 1235073", "url": "https://bugzilla.suse.com/1235073" }, { "category": "self", "summary": "SUSE Bug 1235220", "url": "https://bugzilla.suse.com/1235220" }, { "category": "self", "summary": "SUSE Bug 1235224", "url": "https://bugzilla.suse.com/1235224" }, { "category": "self", "summary": "SUSE Bug 1235246", "url": "https://bugzilla.suse.com/1235246" }, { "category": "self", "summary": "SUSE Bug 1235507", "url": "https://bugzilla.suse.com/1235507" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36788 page", "url": "https://www.suse.com/security/cve/CVE-2020-36788/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4148 page", "url": "https://www.suse.com/security/cve/CVE-2021-4148/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-42327 page", "url": "https://www.suse.com/security/cve/CVE-2021-42327/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-47202 page", "url": "https://www.suse.com/security/cve/CVE-2021-47202/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-47365 page", "url": "https://www.suse.com/security/cve/CVE-2021-47365/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-47489 page", "url": "https://www.suse.com/security/cve/CVE-2021-47489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-47491 page", "url": "https://www.suse.com/security/cve/CVE-2021-47491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-47492 page", "url": "https://www.suse.com/security/cve/CVE-2021-47492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48632 page", "url": "https://www.suse.com/security/cve/CVE-2022-48632/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48634 page", "url": "https://www.suse.com/security/cve/CVE-2022-48634/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48636 page", "url": "https://www.suse.com/security/cve/CVE-2022-48636/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48652 page", "url": "https://www.suse.com/security/cve/CVE-2022-48652/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48671 page", "url": "https://www.suse.com/security/cve/CVE-2022-48671/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48672 page", "url": "https://www.suse.com/security/cve/CVE-2022-48672/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48673 page", "url": "https://www.suse.com/security/cve/CVE-2022-48673/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48675 page", "url": "https://www.suse.com/security/cve/CVE-2022-48675/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48686 page", "url": "https://www.suse.com/security/cve/CVE-2022-48686/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48687 page", "url": "https://www.suse.com/security/cve/CVE-2022-48687/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48688 page", "url": "https://www.suse.com/security/cve/CVE-2022-48688/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48692 page", "url": "https://www.suse.com/security/cve/CVE-2022-48692/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48693 page", "url": "https://www.suse.com/security/cve/CVE-2022-48693/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48694 page", "url": "https://www.suse.com/security/cve/CVE-2022-48694/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48695 page", "url": "https://www.suse.com/security/cve/CVE-2022-48695/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48697 page", "url": "https://www.suse.com/security/cve/CVE-2022-48697/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48699 page", "url": "https://www.suse.com/security/cve/CVE-2022-48699/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48700 page", "url": "https://www.suse.com/security/cve/CVE-2022-48700/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48701 page", "url": "https://www.suse.com/security/cve/CVE-2022-48701/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48702 page", "url": "https://www.suse.com/security/cve/CVE-2022-48702/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48703 page", "url": "https://www.suse.com/security/cve/CVE-2022-48703/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48704 page", "url": "https://www.suse.com/security/cve/CVE-2022-48704/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49035 page", "url": "https://www.suse.com/security/cve/CVE-2022-49035/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0160 page", "url": "https://www.suse.com/security/cve/CVE-2023-0160/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2860 page", "url": "https://www.suse.com/security/cve/CVE-2023-2860/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52591 page", "url": "https://www.suse.com/security/cve/CVE-2023-52591/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52654 page", "url": "https://www.suse.com/security/cve/CVE-2023-52654/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52655 page", "url": "https://www.suse.com/security/cve/CVE-2023-52655/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52676 page", "url": "https://www.suse.com/security/cve/CVE-2023-52676/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6531 page", "url": "https://www.suse.com/security/cve/CVE-2023-6531/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26764 page", "url": "https://www.suse.com/security/cve/CVE-2024-26764/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-35811 page", "url": "https://www.suse.com/security/cve/CVE-2024-35811/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-35815 page", "url": "https://www.suse.com/security/cve/CVE-2024-35815/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-35895 page", "url": "https://www.suse.com/security/cve/CVE-2024-35895/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-35914 page", "url": "https://www.suse.com/security/cve/CVE-2024-35914/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-50154 page", "url": "https://www.suse.com/security/cve/CVE-2024-50154/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53095 page", "url": "https://www.suse.com/security/cve/CVE-2024-53095/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53142 page", "url": "https://www.suse.com/security/cve/CVE-2024-53142/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53146 page", "url": "https://www.suse.com/security/cve/CVE-2024-53146/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53156 page", "url": "https://www.suse.com/security/cve/CVE-2024-53156/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53173 page", "url": "https://www.suse.com/security/cve/CVE-2024-53173/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53179 page", "url": "https://www.suse.com/security/cve/CVE-2024-53179/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53206 page", "url": "https://www.suse.com/security/cve/CVE-2024-53206/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53214 page", "url": "https://www.suse.com/security/cve/CVE-2024-53214/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53239 page", "url": "https://www.suse.com/security/cve/CVE-2024-53239/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53240 page", "url": "https://www.suse.com/security/cve/CVE-2024-53240/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53241 page", "url": "https://www.suse.com/security/cve/CVE-2024-53241/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56539 page", "url": "https://www.suse.com/security/cve/CVE-2024-56539/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56548 page", "url": "https://www.suse.com/security/cve/CVE-2024-56548/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56570 page", "url": "https://www.suse.com/security/cve/CVE-2024-56570/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56598 page", "url": "https://www.suse.com/security/cve/CVE-2024-56598/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56604 page", "url": "https://www.suse.com/security/cve/CVE-2024-56604/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56605 page", "url": "https://www.suse.com/security/cve/CVE-2024-56605/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56619 page", "url": "https://www.suse.com/security/cve/CVE-2024-56619/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-8805 page", "url": "https://www.suse.com/security/cve/CVE-2024-8805/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2025-01-24T10:10:55Z", "generator": { "date": "2025-01-24T10:10:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0231-1", "initial_release_date": "2025-01-24T10:10:55Z", "revision_history": [ { "date": "2025-01-24T10:10:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.14.21-150400.15.106.1.noarch", "product": { "name": "kernel-devel-rt-5.14.21-150400.15.106.1.noarch", "product_id": "kernel-devel-rt-5.14.21-150400.15.106.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.14.21-150400.15.106.1.noarch", "product": { "name": "kernel-source-rt-5.14.21-150400.15.106.1.noarch", "product_id": "kernel-source-rt-5.14.21-150400.15.106.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product_id": "cluster-md-kmp-rt-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product": { "name": "dlm-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product_id": "dlm-kmp-rt-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product_id": "gfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-rt-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-rt-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-rt-devel-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-rt-devel-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-rt-extra-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-rt-extra-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-rt-livepatch-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-rt-livepatch-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-rt-optional-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-rt-optional-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-rt_debug-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-rt_debug-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-rt_debug-devel-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kernel-syms-rt-5.14.21-150400.15.106.1.x86_64", "product_id": "kernel-syms-rt-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product_id": "kselftests-kmp-rt-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product_id": "ocfs2-kmp-rt-5.14.21-150400.15.106.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.14.21-150400.15.106.1.x86_64", "product_id": "reiserfs-kmp-rt-5.14.21-150400.15.106.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150400.15.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150400.15.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.14.21-150400.15.106.1.noarch as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch" }, "product_reference": "kernel-source-rt-5.14.21-150400.15.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150400.15.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150400.15.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.14.21-150400.15.106.1.noarch as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" }, "product_reference": "kernel-source-rt-5.14.21-150400.15.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-36788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36788" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: avoid a use-after-free when BO init fails\n\nnouveau_bo_init() is backed by ttm_bo_init() and ferries its return code\nback to the caller. On failures, ttm_bo_init() invokes the provided\ndestructor which should de-initialize and free the memory.\n\nThus, when nouveau_bo_init() returns an error the gem object has already\nbeen released and the memory freed by nouveau_bo_del_ttm().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36788", "url": "https://www.suse.com/security/cve/CVE-2020-36788" }, { "category": "external", "summary": "SUSE Bug 1224816 for CVE-2020-36788", "url": "https://bugzilla.suse.com/1224816" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2020-36788" }, { "cve": "CVE-2021-4148", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4148" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4148", "url": "https://www.suse.com/security/cve/CVE-2021-4148" }, { "category": "external", "summary": "SUSE Bug 1193983 for CVE-2021-4148", "url": "https://bugzilla.suse.com/1193983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2021-4148" }, { "cve": "CVE-2021-42327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-42327" } ], "notes": [ { "category": "general", "text": "dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-42327", "url": "https://www.suse.com/security/cve/CVE-2021-42327" }, { "category": "external", "summary": "SUSE Bug 1191949 for CVE-2021-42327", "url": "https://bugzilla.suse.com/1191949" }, { "category": "external", "summary": "SUSE Bug 1224901 for CVE-2021-42327", "url": "https://bugzilla.suse.com/1224901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2021-42327" }, { "cve": "CVE-2021-47202", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-47202" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: Fix NULL pointer dereferences in of_thermal_ functions\n\nof_parse_thermal_zones() parses the thermal-zones node and registers a\nthermal_zone device for each subnode. However, if a thermal zone is\nconsuming a thermal sensor and that thermal sensor device hasn\u0027t probed\nyet, an attempt to set trip_point_*_temp for that thermal zone device\ncan cause a NULL pointer dereference. Fix it.\n\n console:/sys/class/thermal/thermal_zone87 # echo 120000 \u003e trip_point_0_temp\n ...\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020\n ...\n Call trace:\n of_thermal_set_trip_temp+0x40/0xc4\n trip_point_temp_store+0xc0/0x1dc\n dev_attr_store+0x38/0x88\n sysfs_kf_write+0x64/0xc0\n kernfs_fop_write_iter+0x108/0x1d0\n vfs_write+0x2f4/0x368\n ksys_write+0x7c/0xec\n __arm64_sys_write+0x20/0x30\n el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc\n do_el0_svc+0x28/0xa0\n el0_svc+0x14/0x24\n el0_sync_handler+0x88/0xec\n el0_sync+0x1c0/0x200\n\nWhile at it, fix the possible NULL pointer dereference in other\nfunctions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),\nof_thermal_get_trend().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-47202", "url": "https://www.suse.com/security/cve/CVE-2021-47202" }, { "category": "external", "summary": "SUSE Bug 1222878 for CVE-2021-47202", "url": "https://bugzilla.suse.com/1222878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2021-47202" }, { "cve": "CVE-2021-47365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-47365" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Fix page leak\n\nThere\u0027s a loop in afs_extend_writeback() that adds extra pages to a write\nwe want to make to improve the efficiency of the writeback by making it\nlarger. This loop stops, however, if we hit a page we can\u0027t write back\nfrom immediately, but it doesn\u0027t get rid of the page ref we speculatively\nacquired.\n\nThis was caused by the removal of the cleanup loop when the code switched\nfrom using find_get_pages_contig() to xarray scanning as the latter only\ngets a single page at a time, not a batch.\n\nFix this by putting the page on a ref on an early break from the loop.\nUnfortunately, we can\u0027t just add that page to the pagevec we\u0027re employing\nas we\u0027ll go through that and add those pages to the RPC call.\n\nThis was found by the generic/074 test. It leaks ~4GiB of RAM each time it\nis run - which can be observed with \"top\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-47365", "url": "https://www.suse.com/security/cve/CVE-2021-47365" }, { "category": "external", "summary": "SUSE Bug 1224895 for CVE-2021-47365", "url": "https://bugzilla.suse.com/1224895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2021-47365" }, { "cve": "CVE-2021-47489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-47489" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix even more out of bound writes from debugfs\n\nCVE-2021-42327 was fixed by:\n\ncommit f23750b5b3d98653b31d4469592935ef6364ad67\nAuthor: Thelford Williams \u003ctdwilliamsiv@gmail.com\u003e\nDate: Wed Oct 13 16:04:13 2021 -0400\n\n drm/amdgpu: fix out of bounds write\n\nbut amdgpu_dm_debugfs.c contains more of the same issue so fix the\nremaining ones.\n\nv2:\n\t* Add missing fix in dp_max_bpc_write (Harry Wentland)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-47489", "url": "https://www.suse.com/security/cve/CVE-2021-47489" }, { "category": "external", "summary": "SUSE Bug 1224901 for CVE-2021-47489", "url": "https://bugzilla.suse.com/1224901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2021-47489" }, { "cve": "CVE-2021-47491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-47491" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: khugepaged: skip huge page collapse for special files\n\nThe read-only THP for filesystems will collapse THP for files opened\nreadonly and mapped with VM_EXEC. The intended usecase is to avoid TLB\nmisses for large text segments. But it doesn\u0027t restrict the file types\nso a THP could be collapsed for a non-regular file, for example, block\ndevice, if it is opened readonly and mapped with EXEC permission. This\nmay cause bugs, like [1] and [2].\n\nThis is definitely not the intended usecase, so just collapse THP for\nregular files in order to close the attack surface.\n\n[shy828301@gmail.com: fix vm_file check [3]]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-47491", "url": "https://www.suse.com/security/cve/CVE-2021-47491" }, { "category": "external", "summary": "SUSE Bug 1224900 for CVE-2021-47491", "url": "https://bugzilla.suse.com/1224900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2021-47491" }, { "cve": "CVE-2021-47492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-47492" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, thp: bail out early in collapse_file for writeback page\n\nCurrently collapse_file does not explicitly check PG_writeback, instead,\npage_has_private and try_to_release_page are used to filter writeback\npages. This does not work for xfs with blocksize equal to or larger\nthan pagesize, because in such case xfs has no page-\u003eprivate.\n\nThis makes collapse_file bail out early for writeback page. Otherwise,\nxfs end_page_writeback will panic as follows.\n\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32\n aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:\"libtest.so\"\n flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)\n raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8\n raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000\n page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u \u003c= 127u))\n page-\u003emem_cgroup:ffff0000c3e9a000\n ------------[ cut here ]------------\n kernel BUG at include/linux/mm.h:1212!\n Internal error: Oops - BUG: 0 [#1] SMP\n Modules linked in:\n BUG: Bad page state in process khugepaged pfn:84ef32\n xfs(E)\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32\n libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...\n CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n Call trace:\n end_page_writeback+0x1c0/0x214\n iomap_finish_page_writeback+0x13c/0x204\n iomap_finish_ioend+0xe8/0x19c\n iomap_writepage_end_bio+0x38/0x50\n bio_endio+0x168/0x1ec\n blk_update_request+0x278/0x3f0\n blk_mq_end_request+0x34/0x15c\n virtblk_request_done+0x38/0x74 [virtio_blk]\n blk_done_softirq+0xc4/0x110\n __do_softirq+0x128/0x38c\n __irq_exit_rcu+0x118/0x150\n irq_exit+0x1c/0x30\n __handle_domain_irq+0x8c/0xf0\n gic_handle_irq+0x84/0x108\n el1_irq+0xcc/0x180\n arch_cpu_idle+0x18/0x40\n default_idle_call+0x4c/0x1a0\n cpuidle_idle_call+0x168/0x1e0\n do_idle+0xb4/0x104\n cpu_startup_entry+0x30/0x9c\n secondary_start_kernel+0x104/0x180\n Code: d4210000 b0006161 910c8021 94013f4d (d4210000)\n ---[ end trace 4a88c6a074082f8c ]---\n Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-47492", "url": "https://www.suse.com/security/cve/CVE-2021-47492" }, { "category": "external", "summary": "SUSE Bug 1224898 for CVE-2021-47492", "url": "https://bugzilla.suse.com/1224898" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2021-47492" }, { "cve": "CVE-2022-48632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48632" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()\n\nmemcpy() is called in a loop while \u0027operation-\u003elength\u0027 upper bound\nis not checked and \u0027data_idx\u0027 also increments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48632", "url": "https://www.suse.com/security/cve/CVE-2022-48632" }, { "category": "external", "summary": "SUSE Bug 1223481 for CVE-2022-48632", "url": "https://bugzilla.suse.com/1223481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48632" }, { "cve": "CVE-2022-48634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48634" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: Fix BUG: sleeping function called from invalid context errors\n\ngma_crtc_page_flip() was holding the event_lock spinlock while calling\ncrtc_funcs-\u003emode_set_base() which takes ww_mutex.\n\nThe only reason to hold event_lock is to clear gma_crtc-\u003epage_flip_event\non mode_set_base() errors.\n\nInstead unlock it after setting gma_crtc-\u003epage_flip_event and on\nerrors re-take the lock and clear gma_crtc-\u003epage_flip_event it\nit is still set.\n\nThis fixes the following WARN/stacktrace:\n\n[ 512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870\n[ 512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell\n[ 512.123031] preempt_count: 1, expected: 0\n[ 512.123048] RCU nest depth: 0, expected: 0\n[ 512.123066] INFO: lockdep is turned off.\n[ 512.123080] irq event stamp: 0\n[ 512.123094] hardirqs last enabled at (0): [\u003c0000000000000000\u003e] 0x0\n[ 512.123134] hardirqs last disabled at (0): [\u003cffffffff8d0ec28c\u003e] copy_process+0x9fc/0x1de0\n[ 512.123176] softirqs last enabled at (0): [\u003cffffffff8d0ec28c\u003e] copy_process+0x9fc/0x1de0\n[ 512.123207] softirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\n[ 512.123233] Preemption disabled at:\n[ 512.123241] [\u003c0000000000000000\u003e] 0x0\n[ 512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G W 5.19.0+ #1\n[ 512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013\n[ 512.123323] Call Trace:\n[ 512.123346] \u003cTASK\u003e\n[ 512.123370] dump_stack_lvl+0x5b/0x77\n[ 512.123412] __might_resched.cold+0xff/0x13a\n[ 512.123458] ww_mutex_lock+0x1e/0xa0\n[ 512.123495] psb_gem_pin+0x2c/0x150 [gma500_gfx]\n[ 512.123601] gma_pipe_set_base+0x76/0x240 [gma500_gfx]\n[ 512.123708] gma_crtc_page_flip+0x95/0x130 [gma500_gfx]\n[ 512.123808] drm_mode_page_flip_ioctl+0x57d/0x5d0\n[ 512.123897] ? drm_mode_cursor2_ioctl+0x10/0x10\n[ 512.123936] drm_ioctl_kernel+0xa1/0x150\n[ 512.123984] drm_ioctl+0x21f/0x420\n[ 512.124025] ? drm_mode_cursor2_ioctl+0x10/0x10\n[ 512.124070] ? rcu_read_lock_bh_held+0xb/0x60\n[ 512.124104] ? lock_release+0x1ef/0x2d0\n[ 512.124161] __x64_sys_ioctl+0x8d/0xd0\n[ 512.124203] do_syscall_64+0x58/0x80\n[ 512.124239] ? do_syscall_64+0x67/0x80\n[ 512.124267] ? trace_hardirqs_on_prepare+0x55/0xe0\n[ 512.124300] ? do_syscall_64+0x67/0x80\n[ 512.124340] ? rcu_read_lock_sched_held+0x10/0x80\n[ 512.124377] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 512.124411] RIP: 0033:0x7fcc4a70740f\n[ 512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 \u003c89\u003e c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00\n[ 512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f\n[ 512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009\n[ 512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034\n[ 512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0\n[ 512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0\n[ 512.124647] \u003c/TASK\u003e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48634", "url": "https://www.suse.com/security/cve/CVE-2022-48634" }, { "category": "external", "summary": "SUSE Bug 1223501 for CVE-2022-48634", "url": "https://bugzilla.suse.com/1223501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48634" }, { "cve": "CVE-2022-48636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48636" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48636", "url": "https://www.suse.com/security/cve/CVE-2022-48636" }, { "category": "external", "summary": "SUSE Bug 1223512 for CVE-2022-48636", "url": "https://bugzilla.suse.com/1223512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48636" }, { "cve": "CVE-2022-48652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48652" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix crash by keep old cfg when update TCs more than queues\n\nThere are problems if allocated queues less than Traffic Classes.\n\nCommit a632b2a4c920 (\"ice: ethtool: Prohibit improper channel config\nfor DCB\") already disallow setting less queues than TCs.\n\nAnother case is if we first set less queues, and later update more TCs\nconfig due to LLDP, ice_vsi_cfg_tc() will failed but left dirty\nnum_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.\n\n[ 95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.\n[ 95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!\n[ 95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0\n[ 95.969621] general protection fault: 0000 [#1] SMP NOPTI\n[ 95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G U W O --------- -t - 4.18.0 #1\n[ 95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021\n[ 95.969992] RIP: 0010:devm_kmalloc+0xa/0x60\n[ 95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 \u003c8b\u003e 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c\n[ 95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206\n[ 95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0\n[ 95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200\n[ 95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000\n[ 95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100\n[ 95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460\n[ 95.970981] FS: 00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000\n[ 95.971108] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0\n[ 95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 95.971530] PKRU: 55555554\n[ 95.971573] Call Trace:\n[ 95.971622] ice_setup_rx_ring+0x39/0x110 [ice]\n[ 95.971695] ice_vsi_setup_rx_rings+0x54/0x90 [ice]\n[ 95.971774] ice_vsi_open+0x25/0x120 [ice]\n[ 95.971843] ice_open_internal+0xb8/0x1f0 [ice]\n[ 95.971919] ice_ena_vsi+0x4f/0xd0 [ice]\n[ 95.971987] ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]\n[ 95.972082] ice_pf_dcb_cfg+0x29a/0x380 [ice]\n[ 95.972154] ice_dcbnl_setets+0x174/0x1b0 [ice]\n[ 95.972220] dcbnl_ieee_set+0x89/0x230\n[ 95.972279] ? dcbnl_ieee_del+0x150/0x150\n[ 95.972341] dcb_doit+0x124/0x1b0\n[ 95.972392] rtnetlink_rcv_msg+0x243/0x2f0\n[ 95.972457] ? dcb_doit+0x14d/0x1b0\n[ 95.972510] ? __kmalloc_node_track_caller+0x1d3/0x280\n[ 95.972591] ? rtnl_calcit.isra.31+0x100/0x100\n[ 95.972661] netlink_rcv_skb+0xcf/0xf0\n[ 95.972720] netlink_unicast+0x16d/0x220\n[ 95.972781] netlink_sendmsg+0x2ba/0x3a0\n[ 95.975891] sock_sendmsg+0x4c/0x50\n[ 95.979032] ___sys_sendmsg+0x2e4/0x300\n[ 95.982147] ? kmem_cache_alloc+0x13e/0x190\n[ 95.985242] ? __wake_up_common_lock+0x79/0x90\n[ 95.988338] ? __check_object_size+0xac/0x1b0\n[ 95.991440] ? _copy_to_user+0x22/0x30\n[ 95.994539] ? move_addr_to_user+0xbb/0xd0\n[ 95.997619] ? __sys_sendmsg+0x53/0x80\n[ 96.000664] __sys_sendmsg+0x53/0x80\n[ 96.003747] do_syscall_64+0x5b/0x1d0\n[ 96.006862] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nOnly update num_txq/rxq when passed check, and restore tc_cfg if setup\nqueue map failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48652", "url": "https://www.suse.com/security/cve/CVE-2022-48652" }, { "category": "external", "summary": "SUSE Bug 1223520 for CVE-2022-48652", "url": "https://bugzilla.suse.com/1223520" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48652" }, { "cve": "CVE-2022-48671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48671" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()\n\nsyzbot is hitting percpu_rwsem_assert_held(\u0026cpu_hotplug_lock) warning at\ncpuset_attach() [1], for commit 4f7e7236435ca0ab (\"cgroup: Fix\nthreadgroup_rwsem \u003c-\u003e cpus_read_lock() deadlock\") missed that\ncpuset_attach() is also called from cgroup_attach_task_all().\nAdd cpus_read_lock() like what cgroup_procs_write_start() does.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48671", "url": "https://www.suse.com/security/cve/CVE-2022-48671" }, { "category": "external", "summary": "SUSE Bug 1223929 for CVE-2022-48671", "url": "https://bugzilla.suse.com/1223929" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48671" }, { "cve": "CVE-2022-48672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48672" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48672", "url": "https://www.suse.com/security/cve/CVE-2022-48672" }, { "category": "external", "summary": "SUSE Bug 1223931 for CVE-2022-48672", "url": "https://bugzilla.suse.com/1223931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48672" }, { "cve": "CVE-2022-48673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48673" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Fix possible access to freed memory in link clear\n\nAfter modifying the QP to the Error state, all RX WR would be completed\nwith WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not\nwait for it is done, but destroy the QP and free the link group directly.\nSo there is a risk that accessing the freed memory in tasklet context.\n\nHere is a crash example:\n\n BUG: unable to handle page fault for address: ffffffff8f220860\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060\n Oops: 0002 [#1] SMP PTI\n CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S OE 5.10.0-0607+ #23\n Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018\n RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0\n Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e \u003c48\u003e 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32\n RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086\n RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000\n RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00\n RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b\n R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010\n R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040\n FS: 0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \u003cIRQ\u003e\n _raw_spin_lock_irqsave+0x30/0x40\n mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]\n smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]\n tasklet_action_common.isra.21+0x66/0x100\n __do_softirq+0xd5/0x29c\n asm_call_irq_on_stack+0x12/0x20\n \u003c/IRQ\u003e\n do_softirq_own_stack+0x37/0x40\n irq_exit_rcu+0x9d/0xa0\n sysvec_call_function_single+0x34/0x80\n asm_sysvec_call_function_single+0x12/0x20", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48673", "url": "https://www.suse.com/security/cve/CVE-2022-48673" }, { "category": "external", "summary": "SUSE Bug 1223934 for CVE-2022-48673", "url": "https://bugzilla.suse.com/1223934" }, { "category": "external", "summary": "SUSE Bug 1223940 for CVE-2022-48673", "url": "https://bugzilla.suse.com/1223940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48673" }, { "cve": "CVE-2022-48675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48675" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Fix a nested dead lock as part of ODP flow\n\nFix a nested dead lock as part of ODP flow by using mmput_async().\n\nFrom the below call trace [1] can see that calling mmput() once we have\nthe umem_odp-\u003eumem_mutex locked as required by\nib_umem_odp_map_dma_and_lock() might trigger in the same task the\nexit_mmap()-\u003e__mmu_notifier_release()-\u003emlx5_ib_invalidate_range() which\nmay dead lock when trying to lock the same mutex.\n\nMoving to use mmput_async() will solve the problem as the above\nexit_mmap() flow will be called in other task and will be executed once\nthe lock will be available.\n\n[1]\n[64843.077665] task:kworker/u133:2 state:D stack: 0 pid:80906 ppid:\n2 flags:0x00004000\n[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]\n[64843.077719] Call Trace:\n[64843.077722] \u003cTASK\u003e\n[64843.077724] __schedule+0x23d/0x590\n[64843.077729] schedule+0x4e/0xb0\n[64843.077735] schedule_preempt_disabled+0xe/0x10\n[64843.077740] __mutex_lock.constprop.0+0x263/0x490\n[64843.077747] __mutex_lock_slowpath+0x13/0x20\n[64843.077752] mutex_lock+0x34/0x40\n[64843.077758] mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]\n[64843.077808] __mmu_notifier_release+0x1a4/0x200\n[64843.077816] exit_mmap+0x1bc/0x200\n[64843.077822] ? walk_page_range+0x9c/0x120\n[64843.077828] ? __cond_resched+0x1a/0x50\n[64843.077833] ? mutex_lock+0x13/0x40\n[64843.077839] ? uprobe_clear_state+0xac/0x120\n[64843.077860] mmput+0x5f/0x140\n[64843.077867] ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]\n[64843.077931] pagefault_real_mr+0x9a/0x140 [mlx5_ib]\n[64843.077962] pagefault_mr+0xb4/0x550 [mlx5_ib]\n[64843.077992] pagefault_single_data_segment.constprop.0+0x2ac/0x560\n[mlx5_ib]\n[64843.078022] mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]\n[64843.078051] process_one_work+0x22b/0x3d0\n[64843.078059] worker_thread+0x53/0x410\n[64843.078065] ? process_one_work+0x3d0/0x3d0\n[64843.078073] kthread+0x12a/0x150\n[64843.078079] ? set_kthread_struct+0x50/0x50\n[64843.078085] ret_from_fork+0x22/0x30\n[64843.078093] \u003c/TASK\u003e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48675", "url": "https://www.suse.com/security/cve/CVE-2022-48675" }, { "category": "external", "summary": "SUSE Bug 1223894 for CVE-2022-48675", "url": "https://bugzilla.suse.com/1223894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48675" }, { "cve": "CVE-2022-48686", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48686" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48686", "url": "https://www.suse.com/security/cve/CVE-2022-48686" }, { "category": "external", "summary": "SUSE Bug 1223948 for CVE-2022-48686", "url": "https://bugzilla.suse.com/1223948" }, { "category": "external", "summary": "SUSE Bug 1226337 for CVE-2022-48686", "url": "https://bugzilla.suse.com/1226337" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2022-48686" }, { "cve": "CVE-2022-48687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48687" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix out-of-bounds read when setting HMAC data.\n\nThe SRv6 layer allows defining HMAC data that can later be used to sign IPv6\nSegment Routing Headers. This configuration is realised via netlink through\nfour attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and\nSEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual\nlength of the SECRET attribute, it is possible to provide invalid combinations\n(e.g., secret = \"\", secretlen = 64). This case is not checked in the code and\nwith an appropriately crafted netlink message, an out-of-bounds read of up\nto 64 bytes (max secret length) can occur past the skb end pointer and into\nskb_shared_info:\n\nBreakpoint 1, seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n208\t\tmemcpy(hinfo-\u003esecret, secret, slen);\n(gdb) bt\n #0 seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n #1 0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,\n extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 \u003cinit_net\u003e, family=\u003coptimized out\u003e,\n family=\u003coptimized out\u003e) at net/netlink/genetlink.c:731\n #2 0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,\n family=0xffffffff82fef6c0 \u003cseg6_genl_family\u003e) at net/netlink/genetlink.c:775\n #3 genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792\n #4 0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 \u003cgenl_rcv_msg\u003e)\n at net/netlink/af_netlink.c:2501\n #5 0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803\n #6 0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)\n at net/netlink/af_netlink.c:1319\n #7 netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=\u003coptimized out\u003e)\n at net/netlink/af_netlink.c:1345\n #8 0xffffffff81dff9a4 in netlink_sendmsg (sock=\u003coptimized out\u003e, msg=0xffffc90000ba7e48, len=\u003coptimized out\u003e) at net/netlink/af_netlink.c:1921\n...\n(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)-\u003ehead + ((struct sk_buff *)0xffff88800b1f9f00)-\u003eend\n$1 = 0xffff88800b1b76c0\n(gdb) p/x secret\n$2 = 0xffff88800b1b76c0\n(gdb) p slen\n$3 = 64 \u0027@\u0027\n\nThe OOB data can then be read back from userspace by dumping HMAC state. This\ncommit fixes this by ensuring SECRETLEN cannot exceed the actual length of\nSECRET.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48687", "url": "https://www.suse.com/security/cve/CVE-2022-48687" }, { "category": "external", "summary": "SUSE Bug 1223952 for CVE-2022-48687", "url": "https://bugzilla.suse.com/1223952" }, { "category": "external", "summary": "SUSE Bug 1224043 for CVE-2022-48687", "url": "https://bugzilla.suse.com/1224043" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2022-48687" }, { "cve": "CVE-2022-48688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48688" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix kernel crash during module removal\n\nThe driver incorrectly frees client instance and subsequent\ni40e module removal leads to kernel crash.\n\nReproducer:\n1. Do ethtool offline test followed immediately by another one\nhost# ethtool -t eth0 offline; ethtool -t eth0 offline\n2. Remove recursively irdma module that also removes i40e module\nhost# modprobe -r irdma\n\nResult:\n[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting\n[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished\n[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110\n[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2\n[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01\n[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1\n[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030\n[ 8687.768755] #PF: supervisor read access in kernel mode\n[ 8687.773895] #PF: error_code(0x0000) - not-present page\n[ 8687.779034] PGD 0 P4D 0\n[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G W I 5.19.0+ #2\n[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019\n[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]\n[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb \u003c48\u003e 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b\n[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202\n[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000\n[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000\n[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000\n[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0\n[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008\n[ 8687.870342] FS: 00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000\n[ 8687.878427] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0\n[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 8687.905572] PKRU: 55555554\n[ 8687.908286] Call Trace:\n[ 8687.910737] \u003cTASK\u003e\n[ 8687.912843] i40e_remove+0x2c0/0x330 [i40e]\n[ 8687.917040] pci_device_remove+0x33/0xa0\n[ 8687.920962] device_release_driver_internal+0x1aa/0x230\n[ 8687.926188] driver_detach+0x44/0x90\n[ 8687.929770] bus_remove_driver+0x55/0xe0\n[ 8687.933693] pci_unregister_driver+0x2a/0xb0\n[ 8687.937967] i40e_exit_module+0xc/0xf48 [i40e]\n\nTwo offline tests cause IRDMA driver failure (ETIMEDOUT) and this\nfailure is indicated back to i40e_client_subtask() that calls\ni40e_client_del_instance() to free client instance referenced\nby pf-\u003ecinst and sets this pointer to NULL. During the module\nremoval i40e_remove() calls i40e_lan_del_device() that dereferences\npf-\u003ecinst that is NULL -\u003e crash.\nDo not remove client instance when client open callbacks fails and\njust clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs\nto take care about this situation (when netdev is up and client\nis NOT opened) in i40e_notify_client_of_netdev_close() and\ncalls client close callback only when __I40E_CLIENT_INSTANCE_OPENED\nis set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48688", "url": "https://www.suse.com/security/cve/CVE-2022-48688" }, { "category": "external", "summary": "SUSE Bug 1223953 for CVE-2022-48688", "url": "https://bugzilla.suse.com/1223953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48688" }, { "cve": "CVE-2022-48692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48692" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srp: Set scmnd-\u003eresult only when scmnd is not NULL\n\nThis change fixes the following kernel NULL pointer dereference\nwhich is reproduced by blktests srp/007 occasionally.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000170\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014\nWorkqueue: 0x0 (kblockd)\nRIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]\nCode: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 \u003c41\u003e 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9\nRSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282\nRAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000\nRDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff\nRBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001\nR10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000\nR13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n __ib_process_cq+0xb7/0x280 [ib_core]\n ib_poll_handler+0x2b/0x130 [ib_core]\n irq_poll_softirq+0x93/0x150\n __do_softirq+0xee/0x4b8\n irq_exit_rcu+0xf7/0x130\n sysvec_apic_timer_interrupt+0x8e/0xc0\n \u003c/IRQ\u003e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48692", "url": "https://www.suse.com/security/cve/CVE-2022-48692" }, { "category": "external", "summary": "SUSE Bug 1223962 for CVE-2022-48692", "url": "https://bugzilla.suse.com/1223962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48692" }, { "cve": "CVE-2022-48693", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48693" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs\n\nIn brcmstb_pm_probe(), there are two kinds of leak bugs:\n\n(1) we need to add of_node_put() when for_each__matching_node() breaks\n(2) we need to add iounmap() for each iomap in fail path", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48693", "url": "https://www.suse.com/security/cve/CVE-2022-48693" }, { "category": "external", "summary": "SUSE Bug 1223963 for CVE-2022-48693", "url": "https://bugzilla.suse.com/1223963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48693" }, { "cve": "CVE-2022-48694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48694" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix drain SQ hang with no completion\n\nSW generated completions for outstanding WRs posted on SQ\nafter QP is in error target the wrong CQ. This causes the\nib_drain_sq to hang with no completion.\n\nFix this to generate completions on the right CQ.\n\n[ 863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.\n[ 863.979224] Not tainted 5.14.0-130.el9.x86_64 #1\n[ 863.986588] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 863.996997] task:kworker/u52:2 state:D stack: 0 pid: 671 ppid: 2 flags:0x00004000\n[ 864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]\n[ 864.014056] Call Trace:\n[ 864.017575] __schedule+0x206/0x580\n[ 864.022296] schedule+0x43/0xa0\n[ 864.026736] schedule_timeout+0x115/0x150\n[ 864.032185] __wait_for_common+0x93/0x1d0\n[ 864.037717] ? usleep_range_state+0x90/0x90\n[ 864.043368] __ib_drain_sq+0xf6/0x170 [ib_core]\n[ 864.049371] ? __rdma_block_iter_next+0x80/0x80 [ib_core]\n[ 864.056240] ib_drain_sq+0x66/0x70 [ib_core]\n[ 864.062003] rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]\n[ 864.069365] ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]\n[ 864.076386] xprt_rdma_close+0xe/0x30 [rpcrdma]\n[ 864.082593] xprt_autoclose+0x52/0x100 [sunrpc]\n[ 864.088718] process_one_work+0x1e8/0x3c0\n[ 864.094170] worker_thread+0x50/0x3b0\n[ 864.099109] ? rescuer_thread+0x370/0x370\n[ 864.104473] kthread+0x149/0x170\n[ 864.109022] ? set_kthread_struct+0x40/0x40\n[ 864.114713] ret_from_fork+0x22/0x30", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48694", "url": "https://www.suse.com/security/cve/CVE-2022-48694" }, { "category": "external", "summary": "SUSE Bug 1223964 for CVE-2022-48694", "url": "https://bugzilla.suse.com/1223964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48694" }, { "cve": "CVE-2022-48695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48695" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix use-after-free warning\n\nFix the following use-after-free warning which is observed during\ncontroller reset:\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48695", "url": "https://www.suse.com/security/cve/CVE-2022-48695" }, { "category": "external", "summary": "SUSE Bug 1223941 for CVE-2022-48695", "url": "https://bugzilla.suse.com/1223941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48695" }, { "cve": "CVE-2022-48697", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48697" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48697", "url": "https://www.suse.com/security/cve/CVE-2022-48697" }, { "category": "external", "summary": "SUSE Bug 1223922 for CVE-2022-48697", "url": "https://bugzilla.suse.com/1223922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48697" }, { "cve": "CVE-2022-48699", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48699" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/debug: fix dentry leak in update_sched_domain_debugfs\n\nKuyo reports that the pattern of using debugfs_remove(debugfs_lookup())\nleaks a dentry and with a hotplug stress test, the machine eventually\nruns out of memory.\n\nFix this up by using the newly created debugfs_lookup_and_remove() call\ninstead which properly handles the dentry reference counting logic.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48699", "url": "https://www.suse.com/security/cve/CVE-2022-48699" }, { "category": "external", "summary": "SUSE Bug 1223996 for CVE-2022-48699", "url": "https://bugzilla.suse.com/1223996" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48699" }, { "cve": "CVE-2022-48700", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48700" } ], "notes": [ { "category": "general", "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48700", "url": "https://www.suse.com/security/cve/CVE-2022-48700" }, { "category": "external", "summary": "SUSE Bug 1223957 for CVE-2022-48700", "url": "https://bugzilla.suse.com/1223957" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "low" } ], "title": "CVE-2022-48700" }, { "cve": "CVE-2022-48701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48701" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()\n\nThere may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and\nthe number of it\u0027s interfaces less than 4, an out-of-bounds read bug occurs\nwhen parsing the interface descriptor for this device.\n\nFix this by checking the number of interfaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48701", "url": "https://www.suse.com/security/cve/CVE-2022-48701" }, { "category": "external", "summary": "SUSE Bug 1223921 for CVE-2022-48701", "url": "https://bugzilla.suse.com/1223921" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "low" } ], "title": "CVE-2022-48701" }, { "cve": "CVE-2022-48702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48702" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count \u003e NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type \u0027snd_emu10k1_voice [64]\u0027\nCPU: 1 PID: 31977 Comm: aplay Tainted: G W IOE 6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002 07/22/2010\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48702", "url": "https://www.suse.com/security/cve/CVE-2022-48702" }, { "category": "external", "summary": "SUSE Bug 1223923 for CVE-2022-48702", "url": "https://bugzilla.suse.com/1223923" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48702" }, { "cve": "CVE-2022-48703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48703" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR\n\nIn some case, the GDDV returns a package with a buffer which has\nzero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).\n\nThen the data_vault_read() got NULL point dereference problem when\naccessing the 0x10 value in data_vault.\n\n[ 71.024560] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n\nThis patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or\nNULL value in data_vault.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48703", "url": "https://www.suse.com/security/cve/CVE-2022-48703" }, { "category": "external", "summary": "SUSE Bug 1223924 for CVE-2022-48703", "url": "https://bugzilla.suse.com/1223924" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48703" }, { "cve": "CVE-2022-48704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48704" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e] ra = [\u003cffffffff81240844\u003e] ps = 0000 Tainted: G W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000 t0 = fff08800e0008010 t1 = 0000000000010000\nt2 = 0000000000008010 t3 = fff00007e3c00000 t4 = fff00007e3c00258\nt5 = 000000000000ffff t6 = 0000000000000001 t7 = fff00007ef078000\ns0 = fff00007e3c016e8 s1 = fff00007e3c00000 s2 = fff00007e3c00018\ns3 = fff00007e3c00000 s4 = fff00007fff59d80 s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000 a1 = fff00007e3c016e8 a2 = 0000000000000008\na3 = 0000000000000001 a4 = 8f5c28f5c28f5c29 a5 = ffffffff810f4338\nt8 = 0000000000000275 t9 = ffffffff809b66f8 t10 = ff6769c5d964b800\nt11= 000000000000b886 pv = ffffffff811bea20 at = 0000000000000000\ngp = ffffffff81d89690 sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008 43f0074a ad7e0018 ad9e0020 8c3001e8 40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48704", "url": "https://www.suse.com/security/cve/CVE-2022-48704" }, { "category": "external", "summary": "SUSE Bug 1223932 for CVE-2022-48704", "url": "https://bugzilla.suse.com/1223932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2022-48704" }, { "cve": "CVE-2022-49035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49035" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE\n\nI expect that the hardware will have limited this to 16, but just in\ncase it hasn\u0027t, check for this corner case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49035", "url": "https://www.suse.com/security/cve/CVE-2022-49035" }, { "category": "external", "summary": "SUSE Bug 1215304 for CVE-2022-49035", "url": "https://bugzilla.suse.com/1215304" }, { "category": "external", "summary": "SUSE Bug 1235013 for CVE-2022-49035", "url": "https://bugzilla.suse.com/1235013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2022-49035" }, { "cve": "CVE-2023-0160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0160" } ], "notes": [ { "category": "general", "text": "A deadlock flaw was found in the Linux kernel\u0027s BPF subsystem. This flaw allows a local user to potentially crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0160", "url": "https://www.suse.com/security/cve/CVE-2023-0160" }, { "category": "external", "summary": "SUSE Bug 1209657 for CVE-2023-0160", "url": "https://bugzilla.suse.com/1209657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2023-0160" }, { "cve": "CVE-2023-2860", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2860" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2860", "url": "https://www.suse.com/security/cve/CVE-2023-2860" }, { "category": "external", "summary": "SUSE Bug 1211592 for CVE-2023-2860", "url": "https://bugzilla.suse.com/1211592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2023-2860" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-52591", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52591" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52591", "url": "https://www.suse.com/security/cve/CVE-2023-52591" }, { "category": "external", "summary": "SUSE Bug 1221044 for CVE-2023-52591", "url": "https://bugzilla.suse.com/1221044" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-52591", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-52591", "url": "https://bugzilla.suse.com/1221598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2023-52591" }, { "cve": "CVE-2023-52654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52654" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/af_unix: disable sending io_uring over sockets\n\nFile reference cycles have caused lots of problems for io_uring\nin the past, and it still doesn\u0027t work exactly right and races with\nunix_stream_read_generic(). The safest fix would be to completely\ndisallow sending io_uring files via sockets via SCM_RIGHT, so there\nare no possible cycles invloving registered files and thus rendering\nSCM accounting on the io_uring side unnecessary.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52654", "url": "https://www.suse.com/security/cve/CVE-2023-52654" }, { "category": "external", "summary": "SUSE Bug 1224099 for CVE-2023-52654", "url": "https://bugzilla.suse.com/1224099" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2023-52654" }, { "cve": "CVE-2023-52655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52655" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aqc111: check packet for fixup for true limit\n\nIf a device sends a packet that is inbetween 0\nand sizeof(u64) the value passed to skb_trim()\nas length will wrap around ending up as some very\nlarge value.\n\nThe driver will then proceed to parse the header\nlocated at that position, which will either oops or\nprocess some random value.\n\nThe fix is to check against sizeof(u64) rather than\n0, which the driver currently does. The issue exists\nsince the introduction of the driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52655", "url": "https://www.suse.com/security/cve/CVE-2023-52655" }, { "category": "external", "summary": "SUSE Bug 1217169 for CVE-2023-52655", "url": "https://bugzilla.suse.com/1217169" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2023-52655" }, { "cve": "CVE-2023-52676", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52676" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Guard stack limits against 32bit overflow\n\nThis patch promotes the arithmetic around checking stack bounds to be\ndone in the 64-bit domain, instead of the current 32bit. The arithmetic\nimplies adding together a 64-bit register with a int offset. The\nregister was checked to be below 1\u003c\u003c29 when it was variable, but not\nwhen it was fixed. The offset either comes from an instruction (in which\ncase it is 16 bit), from another register (in which case the caller\nchecked it to be below 1\u003c\u003c29 [1]), or from the size of an argument to a\nkfunc (in which case it can be a u32 [2]). Between the register being\ninconsistently checked to be below 1\u003c\u003c29, and the offset being up to an\nu32, it appears that we were open to overflowing the `int`s which were\ncurrently used for arithmetic.\n\n[1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498\n[2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52676", "url": "https://www.suse.com/security/cve/CVE-2023-52676" }, { "category": "external", "summary": "SUSE Bug 1224730 for CVE-2023-52676", "url": "https://bugzilla.suse.com/1224730" }, { "category": "external", "summary": "SUSE Bug 1226336 for CVE-2023-52676", "url": "https://bugzilla.suse.com/1226336" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2023-52676" }, { "cve": "CVE-2023-6531", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6531" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector\u0027s deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6531", "url": "https://www.suse.com/security/cve/CVE-2023-6531" }, { "category": "external", "summary": "SUSE Bug 1218447 for CVE-2023-6531", "url": "https://bugzilla.suse.com/1218447" }, { "category": "external", "summary": "SUSE Bug 1218487 for CVE-2023-6531", "url": "https://bugzilla.suse.com/1218487" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2023-6531" }, { "cve": "CVE-2024-26764", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26764" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio\n\nIf kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the\nfollowing kernel warning appears:\n\nWARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8\nCall trace:\n kiocb_set_cancel_fn+0x9c/0xa8\n ffs_epfile_read_iter+0x144/0x1d0\n io_read+0x19c/0x498\n io_issue_sqe+0x118/0x27c\n io_submit_sqes+0x25c/0x5fc\n __arm64_sys_io_uring_enter+0x104/0xab0\n invoke_syscall+0x58/0x11c\n el0_svc_common+0xb4/0xf4\n do_el0_svc+0x2c/0xb0\n el0_svc+0x2c/0xa4\n el0t_64_sync_handler+0x68/0xb4\n el0t_64_sync+0x1a4/0x1a8\n\nFix this by setting the IOCB_AIO_RW flag for read and write I/O that is\nsubmitted by libaio.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26764", "url": "https://www.suse.com/security/cve/CVE-2024-26764" }, { "category": "external", "summary": "SUSE Bug 1222721 for CVE-2024-26764", "url": "https://bugzilla.suse.com/1222721" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-26764" }, { "cve": "CVE-2024-35811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-35811" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n-\u003ebrcmf_usb_probe\n -\u003ebrcmf_usb_probe_cb\n -\u003ebrcmf_attach\n -\u003ebrcmf_bus_started\n -\u003ebrcmf_cfg80211_attach\n -\u003ewl_init_priv\n -\u003ebrcmf_init_escan\n -\u003eINIT_WORK(\u0026cfg-\u003eescan_timeout_work,\n\t\t brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n -\u003ebrcmf_usb_disconnect_cb\n -\u003ebrcmf_detach\n -\u003ebrcmf_cfg80211_detach\n -\u003ekfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-35811", "url": "https://www.suse.com/security/cve/CVE-2024-35811" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2024-35811", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-35811" }, { "cve": "CVE-2024-35815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-35815" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion\n\nThe first kiocb_set_cancel_fn() argument may point at a struct kiocb\nthat is not embedded inside struct aio_kiocb. With the current code,\ndepending on the compiler, the req-\u003eki_ctx read happens either before\nthe IOCB_AIO_RW test or after that test. Move the req-\u003eki_ctx read such\nthat it is guaranteed that the IOCB_AIO_RW test happens first.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-35815", "url": "https://www.suse.com/security/cve/CVE-2024-35815" }, { "category": "external", "summary": "SUSE Bug 1224685 for CVE-2024-35815", "url": "https://bugzilla.suse.com/1224685" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-35815" }, { "cve": "CVE-2024-35895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-35895" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n CPU0 CPU1\n ---- ----\n lock(\u0026htab-\u003ebuckets[i].lock);\n local_irq_disable();\n lock(\u0026host-\u003elock);\n lock(\u0026htab-\u003ebuckets[i].lock);\n \u003cInterrupt\u003e\n lock(\u0026host-\u003elock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-35895", "url": "https://www.suse.com/security/cve/CVE-2024-35895" }, { "category": "external", "summary": "SUSE Bug 1224511 for CVE-2024-35895", "url": "https://bugzilla.suse.com/1224511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-35895" }, { "cve": "CVE-2024-35914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-35914" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix error cleanup path in nfsd_rename()\n\nCommit a8b0026847b8 (\"rename(): avoid a deadlock in the case of parents\nhaving no common ancestor\") added an error bail out path. However this\npath does not drop the remount protection that has been acquired. Fix\nthe cleanup path to properly drop the remount protection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-35914", "url": "https://www.suse.com/security/cve/CVE-2024-35914" }, { "category": "external", "summary": "SUSE Bug 1224482 for CVE-2024-35914", "url": "https://bugzilla.suse.com/1224482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-35914" }, { "cve": "CVE-2024-50154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-50154" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp/dccp: Don\u0027t use timer_pending() in reqsk_queue_unlink().\n\nMartin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().\n\n \"\"\"\n We are seeing a use-after-free from a bpf prog attached to\n trace_tcp_retransmit_synack. The program passes the req-\u003esk to the\n bpf_sk_storage_get_tracing kernel helper which does check for null\n before using it.\n \"\"\"\n\nThe commit 83fccfc3940c (\"inet: fix potential deadlock in\nreqsk_queue_unlink()\") added timer_pending() in reqsk_queue_unlink() not\nto call del_timer_sync() from reqsk_timer_handler(), but it introduced a\nsmall race window.\n\nBefore the timer is called, expire_timers() calls detach_timer(timer, true)\nto clear timer-\u003eentry.pprev and marks it as not pending.\n\nIf reqsk_queue_unlink() checks timer_pending() just after expire_timers()\ncalls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will\ncontinue running and send multiple SYN+ACKs until it expires.\n\nThe reported UAF could happen if req-\u003esk is close()d earlier than the timer\nexpiration, which is 63s by default.\n\nThe scenario would be\n\n 1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),\n but del_timer_sync() is missed\n\n 2. reqsk timer is executed and scheduled again\n\n 3. req-\u003esk is accept()ed and reqsk_put() decrements rsk_refcnt, but\n reqsk timer still has another one, and inet_csk_accept() does not\n clear req-\u003esk for non-TFO sockets\n\n 4. sk is close()d\n\n 5. reqsk timer is executed again, and BPF touches req-\u003esk\n\nLet\u0027s not use timer_pending() by passing the caller context to\n__inet_csk_reqsk_queue_drop().\n\nNote that reqsk timer is pinned, so the issue does not happen in most\nuse cases. [1]\n\n[0]\nBUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0\n\nUse-after-free read at 0x00000000a891fb3a (in kfence-#1):\nbpf_sk_storage_get_tracing+0x2e/0x1b0\nbpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda\nbpf_trace_run2+0x4c/0xc0\ntcp_rtx_synack+0xf9/0x100\nreqsk_timer_handler+0xda/0x3d0\nrun_timer_softirq+0x292/0x8a0\nirq_exit_rcu+0xf5/0x320\nsysvec_apic_timer_interrupt+0x6d/0x80\nasm_sysvec_apic_timer_interrupt+0x16/0x20\nintel_idle_irq+0x5a/0xa0\ncpuidle_enter_state+0x94/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb\n\nkfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6\n\nallocated by task 0 on cpu 9 at 260507.901592s:\nsk_prot_alloc+0x35/0x140\nsk_clone_lock+0x1f/0x3f0\ninet_csk_clone_lock+0x15/0x160\ntcp_create_openreq_child+0x1f/0x410\ntcp_v6_syn_recv_sock+0x1da/0x700\ntcp_check_req+0x1fb/0x510\ntcp_v6_rcv+0x98b/0x1420\nipv6_list_rcv+0x2258/0x26e0\nnapi_complete_done+0x5b1/0x2990\nmlx5e_napi_poll+0x2ae/0x8d0\nnet_rx_action+0x13e/0x590\nirq_exit_rcu+0xf5/0x320\ncommon_interrupt+0x80/0x90\nasm_common_interrupt+0x22/0x40\ncpuidle_enter_state+0xfb/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb\n\nfreed by task 0 on cpu 9 at 260507.927527s:\nrcu_core_si+0x4ff/0xf10\nirq_exit_rcu+0xf5/0x320\nsysvec_apic_timer_interrupt+0x6d/0x80\nasm_sysvec_apic_timer_interrupt+0x16/0x20\ncpuidle_enter_state+0xfb/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-50154", "url": "https://www.suse.com/security/cve/CVE-2024-50154" }, { "category": "external", "summary": "SUSE Bug 1233070 for CVE-2024-50154", "url": "https://bugzilla.suse.com/1233070" }, { "category": "external", "summary": "SUSE Bug 1233072 for CVE-2024-50154", "url": "https://bugzilla.suse.com/1233072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-50154" }, { "cve": "CVE-2024-53095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53095" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free of network namespace.\n\nRecently, we got a customer report that CIFS triggers oops while\nreconnecting to a server. [0]\n\nThe workload runs on Kubernetes, and some pods mount CIFS servers\nin non-root network namespaces. The problem rarely happened, but\nit was always while the pod was dying.\n\nThe root cause is wrong reference counting for network namespace.\n\nCIFS uses kernel sockets, which do not hold refcnt of the netns that\nthe socket belongs to. That means CIFS must ensure the socket is\nalways freed before its netns; otherwise, use-after-free happens.\n\nThe repro steps are roughly:\n\n 1. mount CIFS in a non-root netns\n 2. drop packets from the netns\n 3. destroy the netns\n 4. unmount CIFS\n\nWe can reproduce the issue quickly with the script [1] below and see\nthe splat [2] if CONFIG_NET_NS_REFCNT_TRACKER is enabled.\n\nWhen the socket is TCP, it is hard to guarantee the netns lifetime\nwithout holding refcnt due to async timers.\n\nLet\u0027s hold netns refcnt for each socket as done for SMC in commit\n9744d2bf1976 (\"smc: Fix use-after-free in tcp_write_timer_handler().\").\n\nNote that we need to move put_net() from cifs_put_tcp_session() to\nclean_demultiplex_info(); otherwise, __sock_create() still could touch a\nfreed netns while cifsd tries to reconnect from cifs_demultiplex_thread().\n\nAlso, maybe_get_net() cannot be put just before __sock_create() because\nthe code is not under RCU and there is a small chance that the same\naddress happened to be reallocated to another netns.\n\n[0]:\nCIFS: VFS: \\\\XXXXXXXXXXX has not responded in 15 seconds. Reconnecting...\nCIFS: Serverclose failed 4 times, giving up\nUnable to handle kernel paging request at virtual address 14de99e461f84a07\nMem abort info:\n ESR = 0x0000000096000004\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000004\n CM = 0, WnR = 0\n[14de99e461f84a07] address between user and kernel address ranges\nInternal error: Oops: 0000000096000004 [#1] SMP\nModules linked in: cls_bpf sch_ingress nls_utf8 cifs cifs_arc4 cifs_md4 dns_resolver tcp_diag inet_diag veth xt_state xt_connmark nf_conntrack_netlink xt_nat xt_statistic xt_MASQUERADE xt_mark xt_addrtype ipt_REJECT nf_reject_ipv4 nft_chain_nat nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_comment nft_compat nf_tables nfnetlink overlay nls_ascii nls_cp437 sunrpc vfat fat aes_ce_blk aes_ce_cipher ghash_ce sm4_ce_cipher sm4 sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 sha1_ce ena button sch_fq_codel loop fuse configfs dmi_sysfs sha2_ce sha256_arm64 dm_mirror dm_region_hash dm_log dm_mod dax efivarfs\nCPU: 5 PID: 2690970 Comm: cifsd Not tainted 6.1.103-109.184.amzn2023.aarch64 #1\nHardware name: Amazon EC2 r7g.4xlarge/, BIOS 1.0 11/1/2018\npstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : fib_rules_lookup+0x44/0x238\nlr : __fib_lookup+0x64/0xbc\nsp : ffff8000265db790\nx29: ffff8000265db790 x28: 0000000000000000 x27: 000000000000bd01\nx26: 0000000000000000 x25: ffff000b4baf8000 x24: ffff00047b5e4580\nx23: ffff8000265db7e0 x22: 0000000000000000 x21: ffff00047b5e4500\nx20: ffff0010e3f694f8 x19: 14de99e461f849f7 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 3f92800abd010002\nx11: 0000000000000001 x10: ffff0010e3f69420 x9 : ffff800008a6f294\nx8 : 0000000000000000 x7 : 0000000000000006 x6 : 0000000000000000\nx5 : 0000000000000001 x4 : ffff001924354280 x3 : ffff8000265db7e0\nx2 : 0000000000000000 x1 : ffff0010e3f694f8 x0 : ffff00047b5e4500\nCall trace:\n fib_rules_lookup+0x44/0x238\n __fib_lookup+0x64/0xbc\n ip_route_output_key_hash_rcu+0x2c4/0x398\n ip_route_output_key_hash+0x60/0x8c\n tcp_v4_connect+0x290/0x488\n __inet_stream_connect+0x108/0x3d0\n inet_stream_connect+0x50/0x78\n kernel_connect+0x6c/0xac\n generic_ip_conne\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53095", "url": "https://www.suse.com/security/cve/CVE-2024-53095" }, { "category": "external", "summary": "SUSE Bug 1233642 for CVE-2024-53095", "url": "https://bugzilla.suse.com/1233642" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-53095" }, { "cve": "CVE-2024-53142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53142" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninitramfs: avoid filename buffer overrun\n\nThe initramfs filename field is defined in\nDocumentation/driver-api/early-userspace/buffer-format.rst as:\n\n 37 cpio_file := ALGN(4) + cpio_header + filename + \"\\0\" + ALGN(4) + data\n...\n 55 ============= ================== =========================\n 56 Field name Field size Meaning\n 57 ============= ================== =========================\n...\n 70 c_namesize 8 bytes Length of filename, including final \\0\n\nWhen extracting an initramfs cpio archive, the kernel\u0027s do_name() path\nhandler assumes a zero-terminated path at @collected, passing it\ndirectly to filp_open() / init_mkdir() / init_mknod().\n\nIf a specially crafted cpio entry carries a non-zero-terminated filename\nand is followed by uninitialized memory, then a file may be created with\ntrailing characters that represent the uninitialized memory. The ability\nto create an initramfs entry would imply already having full control of\nthe system, so the buffer overrun shouldn\u0027t be considered a security\nvulnerability.\n\nAppend the output of the following bash script to an existing initramfs\nand observe any created /initramfs_test_fname_overrunAA* path. E.g.\n ./reproducer.sh | gzip \u003e\u003e /myinitramfs\n\nIt\u0027s easiest to observe non-zero uninitialized memory when the output is\ngzipped, as it\u0027ll overflow the heap allocated @out_buf in __gunzip(),\nrather than the initrd_start+initrd_size block.\n\n---- reproducer.sh ----\nnilchar=\"A\"\t# change to \"\\0\" to properly zero terminate / pad\nmagic=\"070701\"\nino=1\nmode=$(( 0100777 ))\nuid=0\ngid=0\nnlink=1\nmtime=1\nfilesize=0\ndevmajor=0\ndevminor=1\nrdevmajor=0\nrdevminor=0\ncsum=0\nfname=\"initramfs_test_fname_overrun\"\nnamelen=$(( ${#fname} + 1 ))\t# plus one to account for terminator\n\nprintf \"%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s\" \\\n\t$magic $ino $mode $uid $gid $nlink $mtime $filesize \\\n\t$devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname\n\ntermpadlen=$(( 1 + ((4 - ((110 + $namelen) \u0026 3)) % 4) ))\nprintf \"%.s${nilchar}\" $(seq 1 $termpadlen)\n---- reproducer.sh ----\n\nSymlink filename fields handled in do_symlink() won\u0027t overrun past the\ndata segment, due to the explicit zero-termination of the symlink\ntarget.\n\nFix filename buffer overrun by aborting the initramfs FSM if any cpio\nentry doesn\u0027t carry a zero-terminator at the expected (name_len - 1)\noffset.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53142", "url": "https://www.suse.com/security/cve/CVE-2024-53142" }, { "category": "external", "summary": "SUSE Bug 1232436 for CVE-2024-53142", "url": "https://bugzilla.suse.com/1232436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-53142" }, { "cve": "CVE-2024-53146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53146" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53146", "url": "https://www.suse.com/security/cve/CVE-2024-53146" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-53146", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1234854 for CVE-2024-53146", "url": "https://bugzilla.suse.com/1234854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-53146" }, { "cve": "CVE-2024-53156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53156" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()\n\nI found the following bug in my fuzzer:\n\n UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51\n index 255 is out of range for type \u0027htc_endpoint [22]\u0027\n CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: events request_firmware_work_func\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x180/0x1b0\n __ubsan_handle_out_of_bounds+0xd4/0x130\n htc_issue_send.constprop.0+0x20c/0x230\n ? _raw_spin_unlock_irqrestore+0x3c/0x70\n ath9k_wmi_cmd+0x41d/0x610\n ? mark_held_locks+0x9f/0xe0\n ...\n\nSince this bug has been confirmed to be caused by insufficient verification\nof conn_rsp_epid, I think it would be appropriate to add a range check for\nconn_rsp_epid to htc_connect_service() to prevent the bug from occurring.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53156", "url": "https://www.suse.com/security/cve/CVE-2024-53156" }, { "category": "external", "summary": "SUSE Bug 1234846 for CVE-2024-53156", "url": "https://bugzilla.suse.com/1234846" }, { "category": "external", "summary": "SUSE Bug 1234847 for CVE-2024-53156", "url": "https://bugzilla.suse.com/1234847" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-53156", "url": "https://bugzilla.suse.com/1234853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-53156" }, { "cve": "CVE-2024-53173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53173" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53173", "url": "https://www.suse.com/security/cve/CVE-2024-53173" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-53173", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1234891 for CVE-2024-53173", "url": "https://bugzilla.suse.com/1234891" }, { "category": "external", "summary": "SUSE Bug 1234892 for CVE-2024-53173", "url": "https://bugzilla.suse.com/1234892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-53173" }, { "cve": "CVE-2024-53179", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53179" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free of signing key\n\nCustomers have reported use-after-free in @ses-\u003eauth_key.response with\nSMB2.1 + sign mounts which occurs due to following race:\n\ntask A task B\ncifs_mount()\n dfs_mount_share()\n get_session()\n cifs_mount_get_session() cifs_send_recv()\n cifs_get_smb_ses() compound_send_recv()\n cifs_setup_session() smb2_setup_request()\n kfree_sensitive() smb2_calc_signature()\n crypto_shash_setkey() *UAF*\n\nFix this by ensuring that we have a valid @ses-\u003eauth_key.response by\nchecking whether @ses-\u003eses_status is SES_GOOD or SES_EXITING with\n@ses-\u003eses_lock held. After commit 24a9799aa8ef (\"smb: client: fix UAF\nin smb2_reconnect_server()\"), we made sure to call -\u003elogoff() only\nwhen @ses was known to be good (e.g. valid -\u003eauth_key.response), so\nit\u0027s safe to access signing key when @ses-\u003eses_status == SES_EXITING.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53179", "url": "https://www.suse.com/security/cve/CVE-2024-53179" }, { "category": "external", "summary": "SUSE Bug 1234921 for CVE-2024-53179", "url": "https://bugzilla.suse.com/1234921" }, { "category": "external", "summary": "SUSE Bug 1234927 for CVE-2024-53179", "url": "https://bugzilla.suse.com/1234927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-53179" }, { "cve": "CVE-2024-53206", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53206" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Fix use-after-free of nreq in reqsk_timer_handler().\n\nThe cited commit replaced inet_csk_reqsk_queue_drop_and_put() with\n__inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler().\n\nThen, oreq should be passed to reqsk_put() instead of req; otherwise\nuse-after-free of nreq could happen when reqsk is migrated but the\nretry attempt failed (e.g. due to timeout).\n\nLet\u0027s pass oreq to reqsk_put().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53206", "url": "https://www.suse.com/security/cve/CVE-2024-53206" }, { "category": "external", "summary": "SUSE Bug 1234960 for CVE-2024-53206", "url": "https://bugzilla.suse.com/1234960" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-53206" }, { "cve": "CVE-2024-53214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53214" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53214", "url": "https://www.suse.com/security/cve/CVE-2024-53214" }, { "category": "external", "summary": "SUSE Bug 1235004 for CVE-2024-53214", "url": "https://bugzilla.suse.com/1235004" }, { "category": "external", "summary": "SUSE Bug 1235005 for CVE-2024-53214", "url": "https://bugzilla.suse.com/1235005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-53214" }, { "cve": "CVE-2024-53239", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53239" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: 6fire: Release resources at card release\n\nThe current 6fire code tries to release the resources right after the\ncall of usb6fire_chip_abort(). But at this moment, the card object\nmight be still in use (as we\u0027re calling snd_card_free_when_closed()).\n\nFor avoid potential UAFs, move the release of resources to the card\u0027s\nprivate_free instead of the manual call of usb6fire_chip_destroy() at\nthe USB disconnect callback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53239", "url": "https://www.suse.com/security/cve/CVE-2024-53239" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-53239", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1235054 for CVE-2024-53239", "url": "https://bugzilla.suse.com/1235054" }, { "category": "external", "summary": "SUSE Bug 1235055 for CVE-2024-53239", "url": "https://bugzilla.suse.com/1235055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-53239" }, { "cve": "CVE-2024-53240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53240" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/netfront: fix crash when removing device\n\nWhen removing a netfront device directly after a suspend/resume cycle\nit might happen that the queues have not been setup again, causing a\ncrash during the attempt to stop the queues another time.\n\nFix that by checking the queues are existing before trying to stop\nthem.\n\nThis is XSA-465 / CVE-2024-53240.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53240", "url": "https://www.suse.com/security/cve/CVE-2024-53240" }, { "category": "external", "summary": "SUSE Bug 1234281 for CVE-2024-53240", "url": "https://bugzilla.suse.com/1234281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-53240" }, { "cve": "CVE-2024-53241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53241" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: don\u0027t do PV iret hypercall through hypercall page\n\nInstead of jumping to the Xen hypercall page for doing the iret\nhypercall, directly code the required sequence in xen-asm.S.\n\nThis is done in preparation of no longer using hypercall page at all,\nas it has shown to cause problems with speculation mitigations.\n\nThis is part of XSA-466 / CVE-2024-53241.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53241", "url": "https://www.suse.com/security/cve/CVE-2024-53241" }, { "category": "external", "summary": "SUSE Bug 1234282 for CVE-2024-53241", "url": "https://bugzilla.suse.com/1234282" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-53241" }, { "cve": "CVE-2024-56539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56539" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()\n\nReplace one-element array with a flexible-array member in `struct\nmwifiex_ie_types_wildcard_ssid_params` to fix the following warning\non a MT8173 Chromebook (mt8173-elm-hana):\n\n[ 356.775250] ------------[ cut here ]------------\n[ 356.784543] memcpy: detected field-spanning write (size 6) of single field \"wildcard_ssid_tlv-\u003essid\" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)\n[ 356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]\n\nThe \"(size 6)\" above is exactly the length of the SSID of the network\nthis device was connected to. The source of the warning looks like:\n\n ssid_len = user_scan_in-\u003essid_list[i].ssid_len;\n [...]\n memcpy(wildcard_ssid_tlv-\u003essid,\n user_scan_in-\u003essid_list[i].ssid, ssid_len);\n\nThere is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this\nstruct, but it already didn\u0027t account for the size of the one-element\narray, so it doesn\u0027t need to be changed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56539", "url": "https://www.suse.com/security/cve/CVE-2024-56539" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-56539", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1234963 for CVE-2024-56539", "url": "https://bugzilla.suse.com/1234963" }, { "category": "external", "summary": "SUSE Bug 1234964 for CVE-2024-56539", "url": "https://bugzilla.suse.com/1234964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-56539" }, { "cve": "CVE-2024-56548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56548" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: don\u0027t query the device logical block size multiple times\n\nDevices block sizes may change. One of these cases is a loop device by\nusing ioctl LOOP_SET_BLOCK_SIZE.\n\nWhile this may cause other issues like IO being rejected, in the case of\nhfsplus, it will allocate a block by using that size and potentially write\nout-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the\nlatter function reads a different io_size.\n\nUsing a new min_io_size initally set to sb_min_blocksize works for the\npurposes of the original fix, since it will be set to the max between\nHFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the\nmax between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not\ninitialized.\n\nTested by mounting an hfsplus filesystem with loop block sizes 512, 1024\nand 4096.\n\nThe produced KASAN report before the fix looks like this:\n\n[ 419.944641] ==================================================================\n[ 419.945655] BUG: KASAN: slab-use-after-free in hfsplus_read_wrapper+0x659/0xa0a\n[ 419.946703] Read of size 2 at addr ffff88800721fc00 by task repro/10678\n[ 419.947612]\n[ 419.947846] CPU: 0 UID: 0 PID: 10678 Comm: repro Not tainted 6.12.0-rc5-00008-gdf56e0f2f3ca #84\n[ 419.949007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[ 419.950035] Call Trace:\n[ 419.950384] \u003cTASK\u003e\n[ 419.950676] dump_stack_lvl+0x57/0x78\n[ 419.951212] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.951830] print_report+0x14c/0x49e\n[ 419.952361] ? __virt_addr_valid+0x267/0x278\n[ 419.952979] ? kmem_cache_debug_flags+0xc/0x1d\n[ 419.953561] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.954231] kasan_report+0x89/0xb0\n[ 419.954748] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.955367] hfsplus_read_wrapper+0x659/0xa0a\n[ 419.955948] ? __pfx_hfsplus_read_wrapper+0x10/0x10\n[ 419.956618] ? do_raw_spin_unlock+0x59/0x1a9\n[ 419.957214] ? _raw_spin_unlock+0x1a/0x2e\n[ 419.957772] hfsplus_fill_super+0x348/0x1590\n[ 419.958355] ? hlock_class+0x4c/0x109\n[ 419.958867] ? __pfx_hfsplus_fill_super+0x10/0x10\n[ 419.959499] ? __pfx_string+0x10/0x10\n[ 419.960006] ? lock_acquire+0x3e2/0x454\n[ 419.960532] ? bdev_name.constprop.0+0xce/0x243\n[ 419.961129] ? __pfx_bdev_name.constprop.0+0x10/0x10\n[ 419.961799] ? pointer+0x3f0/0x62f\n[ 419.962277] ? __pfx_pointer+0x10/0x10\n[ 419.962761] ? vsnprintf+0x6c4/0xfba\n[ 419.963178] ? __pfx_vsnprintf+0x10/0x10\n[ 419.963621] ? setup_bdev_super+0x376/0x3b3\n[ 419.964029] ? snprintf+0x9d/0xd2\n[ 419.964344] ? __pfx_snprintf+0x10/0x10\n[ 419.964675] ? lock_acquired+0x45c/0x5e9\n[ 419.965016] ? set_blocksize+0x139/0x1c1\n[ 419.965381] ? sb_set_blocksize+0x6d/0xae\n[ 419.965742] ? __pfx_hfsplus_fill_super+0x10/0x10\n[ 419.966179] mount_bdev+0x12f/0x1bf\n[ 419.966512] ? __pfx_mount_bdev+0x10/0x10\n[ 419.966886] ? vfs_parse_fs_string+0xce/0x111\n[ 419.967293] ? __pfx_vfs_parse_fs_string+0x10/0x10\n[ 419.967702] ? __pfx_hfsplus_mount+0x10/0x10\n[ 419.968073] legacy_get_tree+0x104/0x178\n[ 419.968414] vfs_get_tree+0x86/0x296\n[ 419.968751] path_mount+0xba3/0xd0b\n[ 419.969157] ? __pfx_path_mount+0x10/0x10\n[ 419.969594] ? kmem_cache_free+0x1e2/0x260\n[ 419.970311] do_mount+0x99/0xe0\n[ 419.970630] ? __pfx_do_mount+0x10/0x10\n[ 419.971008] __do_sys_mount+0x199/0x1c9\n[ 419.971397] do_syscall_64+0xd0/0x135\n[ 419.971761] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 419.972233] RIP: 0033:0x7c3cb812972e\n[ 419.972564] Code: 48 8b 0d f5 46 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d c2 46 0d 00 f7 d8 64 89 01 48\n[ 419.974371] RSP: 002b:00007ffe30632548 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5\n[ 419.975048] RAX: ffffffffffffffda RBX: 00007ffe306328d8 RCX: 00007c3cb812972e\n[ 419.975701] RDX: 0000000020000000 RSI: 0000000020000c80 RDI:\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56548", "url": "https://www.suse.com/security/cve/CVE-2024-56548" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-56548", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1235073 for CVE-2024-56548", "url": "https://bugzilla.suse.com/1235073" }, { "category": "external", "summary": "SUSE Bug 1235074 for CVE-2024-56548", "url": "https://bugzilla.suse.com/1235074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-56548" }, { "cve": "CVE-2024-56570", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56570" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: Filter invalid inodes with missing lookup function\n\nAdd a check to the ovl_dentry_weird() function to prevent the\nprocessing of directory inodes that lack the lookup function.\nThis is important because such inodes can cause errors in overlayfs\nwhen passed to the lowerstack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56570", "url": "https://www.suse.com/security/cve/CVE-2024-56570" }, { "category": "external", "summary": "SUSE Bug 1235035 for CVE-2024-56570", "url": "https://bugzilla.suse.com/1235035" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "moderate" } ], "title": "CVE-2024-56570" }, { "cve": "CVE-2024-56598", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56598" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: array-index-out-of-bounds fix in dtReadFirst\n\nThe value of stbl can be sometimes out of bounds due\nto a bad filesystem. Added a check with appopriate return\nof error code in that case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56598", "url": "https://www.suse.com/security/cve/CVE-2024-56598" }, { "category": "external", "summary": "SUSE Bug 1235220 for CVE-2024-56598", "url": "https://bugzilla.suse.com/1235220" }, { "category": "external", "summary": "SUSE Bug 1235221 for CVE-2024-56598", "url": "https://bugzilla.suse.com/1235221" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-56598" }, { "cve": "CVE-2024-56604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56604" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()\n\nbt_sock_alloc() attaches allocated sk object to the provided sock object.\nIf rfcomm_dlc_alloc() fails, we release the sk object, but leave the\ndangling pointer in the sock object, which may cause use-after-free.\n\nFix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56604", "url": "https://www.suse.com/security/cve/CVE-2024-56604" }, { "category": "external", "summary": "SUSE Bug 1235056 for CVE-2024-56604", "url": "https://bugzilla.suse.com/1235056" }, { "category": "external", "summary": "SUSE Bug 1235058 for CVE-2024-56604", "url": "https://bugzilla.suse.com/1235058" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-56604" }, { "cve": "CVE-2024-56605", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56605" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()\n\nbt_sock_alloc() allocates the sk object and attaches it to the provided\nsock object. On error l2cap_sock_alloc() frees the sk object, but the\ndangling pointer is still attached to the sock object, which may create\nuse-after-free in other code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56605", "url": "https://www.suse.com/security/cve/CVE-2024-56605" }, { "category": "external", "summary": "SUSE Bug 1234853 for CVE-2024-56605", "url": "https://bugzilla.suse.com/1234853" }, { "category": "external", "summary": "SUSE Bug 1235061 for CVE-2024-56605", "url": "https://bugzilla.suse.com/1235061" }, { "category": "external", "summary": "SUSE Bug 1235062 for CVE-2024-56605", "url": "https://bugzilla.suse.com/1235062" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-56605" }, { "cve": "CVE-2024-56619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56619" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()\n\nSyzbot reported that when searching for records in a directory where the\ninode\u0027s i_size is corrupted and has a large value, memory access outside\nthe folio/page range may occur, or a use-after-free bug may be detected if\nKASAN is enabled.\n\nThis is because nilfs_last_byte(), which is called by nilfs_find_entry()\nand others to calculate the number of valid bytes of directory data in a\npage from i_size and the page index, loses the upper 32 bits of the 64-bit\nsize information due to an inappropriate type of local variable to which\nthe i_size value is assigned.\n\nThis caused a large byte offset value due to underflow in the end address\ncalculation in the calling nilfs_find_entry(), resulting in memory access\nthat exceeds the folio/page size.\n\nFix this issue by changing the type of the local variable causing the bit\nloss from \"unsigned int\" to \"u64\". The return value of nilfs_last_byte()\nis also of type \"unsigned int\", but it is truncated so as not to exceed\nPAGE_SIZE and no bit loss occurs, so no change is required.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56619", "url": "https://www.suse.com/security/cve/CVE-2024-56619" }, { "category": "external", "summary": "SUSE Bug 1235224 for CVE-2024-56619", "url": "https://bugzilla.suse.com/1235224" }, { "category": "external", "summary": "SUSE Bug 1235225 for CVE-2024-56619", "url": "https://bugzilla.suse.com/1235225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-56619" }, { "cve": "CVE-2024-8805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-8805" } ], "notes": [ { "category": "general", "text": "BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-8805", "url": "https://www.suse.com/security/cve/CVE-2024-8805" }, { "category": "external", "summary": "SUSE Bug 1230697 for CVE-2024-8805", "url": "https://bugzilla.suse.com/1230697" }, { "category": "external", "summary": "SUSE Bug 1240804 for CVE-2024-8805", "url": "https://bugzilla.suse.com/1240804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.106.1.noarch", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.106.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.106.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T10:10:55Z", "details": "important" } ], "title": "CVE-2024-8805" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…